Description: Pivoting is a powerful technique within the Metasploit Framework that allows a hacker to access a private subnet within a network. For example, an attacker would compromise a host (ex: web server) that is accessible (i.e., routable IP address) and use that host as a staging point to pivot and compromise other systems in subnets that would not have been accessible from outside the network. According to Metasploit, pivoting is a Meterpreter method that allows for the attack of other systems on a network through the Meterpreter console.
Source :- http://www.security4information.com/2011/10/pivoting-into-other-systems-with_10.html
In this video Surapheal Belay shows how to utilize the metasploit meterpreter payload to identify and exploit a new subnet to which we do not have direct access to. In this demo, he first breaks into a box which has another interface which is on a different subnet. He then shows how to break into the new network by using the compromised host as a pivot.
Tags: Pivoting , metasploit , hacking , hack ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.