sessions
So you’ve owned a box and now you want to exploit others using the first as a pivot. First thing to do is background your current meterpreter session:
1234567meterpreter > background msf exploit(multi_handler) > sessions -l Active sessions =============== Id Type Information … Continue reading →Posted in Networking | Tagged metasploit, meterpreter, pivot, portforward, portfwd, route, sessions | Leave a comment
Recent Posts
- Automating an Active Directory Audit in PowerShell
- CherryTree on MacOS (OSX)
- IPv6 LocalLink to IPv4 scanning tool
- NetKit IPv6 Test Lab
- WiPiResponder = Pi Zero W + Responder
- Recovering an activity from a Garmin 920 XT Forerunner
- hashcat on OS X – getting it going!
- PHP NMAP Scan Page
- Hacking the ATN X-sight – part1
- NFSShell on Kali Linux 2.0