O'Reilly logo

Kali Linux Cookbook - Second Edition by Bob Perciaccante, Corey P. Schultz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Pivoting and expanding access to the network

In this recipe, we will leverage a host as a beachhead to exploit other hosts.

While this recipe may not sound appropriate for the topic of the chapter, one of the best ways of maintaining access to a target network is to have more hosts exploited that you can use for your communication channel. You can also have them use various forms of methods to reach out, so that if one is discovered you have access to others through different means. 

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required