- April 2, 2021 at 2:35 pm #379294
Hi, i am doing a penetration lab of INE, and i am stuck trying to figure out how the autoroute module of metasploit (/usr/share/metasploit-framework/modules/post/multi/manage) works;
[172.16.37.234](https://172.16.37.234) is a webserver where i am using a reverse shell and the webserver has another interface where the address is [172.16.50.224](https://172.16.50.224)(which i cannot reach because is in another subnet)
So basically the guide is telling me to run this magical module of metasploit and i will get access to the [172.16.50.22](https://172.16.50.22), but i don’t understand what is doing, i tried to do ssh tunneling,, without success, however if i just follow the steps now i will finally be able to reach the [172.16.50.22](https://172.16.50.22) machine but i really want to know how it works and why it works
Anyone wanna help me with this?
If you need extra information in order to understand the situation, i will be happy to provide it because this part of the lab is killing me
You must be logged in to reply to this topic.