Network Pivoting Methodology
1) Internal Host Discovery
In a network, if you root a machine, do these checks:
Windows
ipconfig /allroute printarp -anetstat -anotype C:\WINDOWS\System32\drivers\etc\hostsipconfig /displaydns | findstr "Record" | findstr "Name Host"Linux
2) SOCKS Proxy setup
Attacker machine
Victim rooted machine
3) Run tools from your attacking machine to internal network
Example
Last updated