eLearnSecurity Blog

Monthly Archives: June 2012

Nessus and Metasploit: Scan networks in pivoting

Tools: Nessus, Metasploit, Nmap, proxychains.

Attention: In our tests proxychains works only on 32 bit Backtrack 5

One of the best features that Metasploit offers is the ability of “pivoting”.  With this technique, an attacker can use a compromised machine as a “pivot” to attack other machines in the same or in other networks that the compromised host can reach.

Tags: , , , ,

Read more

Go to top of page