Description: Use pivoting to hack clients that aren't directly accessible.
First, we exploit a publicly-visible client. Then, using pivoting, we attack a second client on the same network. Outside access to the second client is blocked by a firewall, which is why we must use pivoting to attack it.
TARGETS: Windows XP Pro service pack 2
EXPLOITS: The meterpreter payload in Metasploit
SOFTWARE: BackTrack5
KEY CONCEPT - Pivoting:
Pivoting refers to the practice of hacking a network computer or server and then using that host to attack other computer systems from within the network. By launching attacks from within the network, the attacker bypasses firewall policy and can execute attacks that would not be possible from outside the network. By using a compromised system to launch attacks from, the attacker has an improved prospect of remaining undetected and can leave less of a fingerprint.
The full notes for this tutorial are available on my website:
http://www.danscourses.com/Network-Penetration-Testing/metasploit-pivoting.html
Tags: metasploit , meterpreter , exploit , pivoting ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
second part of video is very interesting. first hacked first computer and then got a meterpreter session for some other computer from first one
thanks for video
Nice Video, But i like this video http://www.securitytube.net/video/2688 Part Of SMFE !