Using Metasploit
Well, this is a post exploitation technique. Which means you should have the connection to the victim's system. Maybe a meterpreter shell.
Commands
Metasploit Autoroute Module
REFERENCES
Last updated