Description: In this video you will learn how to create a pivot point using armitage tool. Pivoting is a post exploitation processes once you get the shell of any system and you found there are two interface with different subnet so for exploiting that another subnet machine we will use this Pivoting process for post exploitation. There are lots of ways to exploit another subnet machine in Pivoting.
Tags: hacking , hack , pivoting , exploitation ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.