Metsasploit Post-Exploitation on Wan.
Hey guys, I'm new in pentesting world/white hat hacking.
I search all over the web but i can't find any answer.
I have a meterpreter shell on a remote windows box (not on my Lan). Im wondering if its possible to use some auxiliary modules like portscan and netbios scan to scan the LAN of the 'compromise host'? (I was assuming this because there is no portscanner in post modules) The only scanner i found its a metasploit script arp-scanner.
Should i be physically on the network or with a Route command i can do this?
I hope my question is clear.
English is not my primary language, so don't be to rude.