Metasploit Pivoting To Hack Segregated VirtualBox Virtual Machines
Автор: HaXeZ
Загружено: 2022-05-11
Просмотров: 1500
Описание:
Dear friend, welcome to HaXeZ. If you’re new to hacking and cybersecurity then you may have heard about pivoting. If you haven’t then let me explain. Pivoting is where you have compromised a host and discovered it is attached to another network. You then use that host to pivot your scans and attacks to hosts within that other network. For example, imagine you have just compromised a public-facing Web Application server. You check the network configuration and find that it is connected to an internal network. You can then use the compromised web application server to scan that internal network.
0:00 Introduction
0:29 Pivoting
1:17 Lab Set Up
9:03 VM1 Exploit
12:00 Creating The Pivot
14:00 VM2 Exploit
19:05 Conclusion
Music - bensounds.com
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: