Pivoting on Metasploit

Check the IP address of the compromised machine in meterpreter

shell
ip addr

We have another network interface.

Now we can add it to meterpreter route.

Background the current meterpreter session and use the portscan tcp module of Metasploit to scan the second target machine.

Press CTRL+z and Enter y to background the meterpreter session.

Last updated