This topic contains 0 replies, has 1 voice, and was last updated by anonymous 2 weeks, 2 days ago.
- AuthorPosts
- April 2, 2021 at 2:35 pm #379294
Hi, i am doing a penetration lab of INE, and i am stuck trying to figure out how the autoroute module of metasploit (/usr/share/metasploit-framework/modules/post/multi/manage) works;
​
[172.16.37.234](https://172.16.37.234) is a webserver where i am using a reverse shell and the webserver has another interface where the address is [172.16.50.224](https://172.16.50.224)(which i cannot reach because is in another subnet)
So basically the guide is telling me to run this magical module of metasploit and i will get access to the [172.16.50.22](https://172.16.50.22), but i don’t understand what is doing, i tried to do ssh tunneling,, without success, however if i just follow the steps now i will finally be able to reach the [172.16.50.22](https://172.16.50.22) machine but i really want to know how it works and why it works
​
Anyone wanna help me with this?
If you need extra information in order to understand the situation, i will be happy to provide it because this part of the lab is killing me
- AuthorPosts
You must be logged in to reply to this topic.
Comments