Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this Kali Linux tutorial, you will learn how to use Pivoting techniques in Metasploit. Discover vulnerable points inside your environment network using this method.
What is pivoting and double pivoting
Preparing Your Lab
Phone 1st Pivot and Port Forwarding
PC 2nd Pivot and Port Forwarding
Pivot lab summary
In this Kali Linux Tutorial, you will learn how to use Pivoting techniques In Metasploit. This course is intended for security enthusiasts, pen-testers, and system administrators who have prior knowledge of advanced penetration testing. Pivoting in Metasploit is a "unique technique of using an instance (also referred to as a 'plant' or 'foothold') to be able to 'move' around inside a network. Basically using the first compromise to allow and even aid in the compromise of other otherwise inaccessible systems." Learn to perform real-time attacks on virtual machines to test your pen-testing abilities and master the art of penetration testing with Metasploit. You will also get a step-by-step demonstration of the Metasploit framework using real-time examples, diagrams, and presentations for theoretical topics. Upon completion of this course, you will be able to discover a vulnerable point inside your environment network and find a solution with the lowest cost. Course Requirements:
Basics of computers and virtual machines
Have knowledge of information security
Understanding of Linux and Windows operating systems
Have knowledge of CCNA Routing and Switching
No programming skills needed
Complete this course and earn a Pivoting In Metasploit Certificate of Completion