This is a tutorial on how to pivot from the attacking Kali Linux machine to a Windows XP machine (victim) through another Windows XP machine.
Basically, this would seem like the attack is being orchestrated by the XP host in-between the attacker and target. This can be checked using the netstat command in windows shell.
The XP host in-between will have 2 network interfaces. Each of those interfaces will be on the same network as the attacker and victim respectively.
This video tutorial is not to be used for nefarious purposes or any related activities.
Basically, this would seem like the attack is being orchestrated by the XP host in-between the attacker and target. This can be checked using the netstat command in windows shell.
The XP host in-between will have 2 network interfaces. Each of those interfaces will be on the same network as the attacker and victim respectively.
This video tutorial is not to be used for nefarious purposes or any related activities.
Comments
Post a Comment