تفاصيل العمل

Pivoting is a post-exploitation technique used to route traffic through a

compromised machine in order to reach other systems on a network that are

not directly accessible.

It allows attackers to move laterally, discover internal hosts, and exploit

additional targets by using the first compromised host as a gateway

Machines used:

Kali Linux(Attacker machine): used to run exploits, scans, and control sessions

Windows XP(Pivot machine): used as a gateway to access internal network

⟶ (192.168.29.133 ,192.168.100.129)

Windows 7(Target machine): in the internal network exploited after pivoting

⟶ (192.168.100.128)

ملفات مرفقة

بطاقة العمل

اسم المستقل
عدد الإعجابات
0
عدد المشاهدات
39
تاريخ الإضافة
تاريخ الإنجاز
المهارات