Launching Metasploit into the hidden network with autoroute

At the meterpreter prompt, issue the following command:

run post/multi/manage/autoroute SUBNET=10.0.0.0 NETMASK=255.255.255.0 ACTION=ADD

This creates a route into the hidden subnet, managed by the meterpreter session on the Vista box (which we will call our pivot point):

The output is somewhat unclimatic: Route added to subnet. But keep in mind that subnet is now available to Metasploit as if you were on the LAN. To test this theory, I'm going to look for FTP servers on the hidden network. I background my meterpreter session with the background command and jump into the auxiliary ...

Get Hands-On Penetration Testing on Windows now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.