In this Kali Linux tutorial, you will learn how to use Pivoting techniques in Metasploit. Discover vulnerable points inside your environment network using this method.

Course Content

What is pivoting and double pivoting

Preparing Your Lab

Phone 1st Pivot and Port Forwarding

PC 2nd Pivot and Port Forwarding

Pivot lab summary

Course Description

In this Kali Linux Tutorial, you will learn how to use Pivoting techniques In Metasploit. This course is intended for security enthusiasts, pen-testers, and system administrators who have prior knowledge of advanced penetration testing. Pivoting in Metasploit is a "unique technique of using an instance (also referred to as a 'plant' or 'foothold') to be able to 'move' around inside a network. Basically using the first compromise to allow and even aid in the compromise of other otherwise inaccessible systems." Learn to perform real-time attacks on virtual machines to test your pen-testing abilities and master the art of penetration testing with Metasploit. You will also get a step-by-step demonstration of the Metasploit framework using real-time examples, diagrams, and presentations for theoretical topics. Upon completion of this course, you will be able to discover a vulnerable point inside your environment network and find a solution with the lowest cost. Course Requirements:

  • Basics of computers and virtual machines

  • Have knowledge of information security

  • Understanding of Linux and Windows operating systems

  • Have knowledge of CCNA Routing and Switching

  • No programming skills needed

Instructed By

Instructor Profile Image
Iven Leni Fernandez
Certificate Of Completion

Complete this course and earn a Pivoting In Metasploit Certificate of Completion