Well, this is a post exploitation technique. Which means you should have the connection to the victim's system. Maybe a meterpreter shell.
# Add a route meterpreter> run autoroute -h # Specify the subnet meterpreter> run autoroute -s <IP address/cidr> # Print the routes route print
run post/multi/manage/autoroute route print # Scan open ports use auxiliary/scanner/portscan/tcp set RHOSTS 10.0.2.0/24 set PORTS 1-100 run
https://docs.metasploit.com/docs/using-metasploit/intermediate/pivoting-in-metasploit.html
https://medium.com/@an0nymiss/pivoting-using-metasploit-framework-1f3e93c7a724
Last updated 11 months ago
Was this helpful?