Questions About Pivoting
hello fellow hackers. i have a question about pivoting.
so, i understand the concept of pivoting, but i do not really understand how to use it. so i read this article, and i am a bit confused at the route part and how to exploit systems once the routing is set up.
1. how does the "route add" syntax work, exactly? is it: route add <ip of default gateway on target network> <subnet mask>?
2. once the routing is set up, how do you scan, spoof, sniff, and exploit? you just do like you were scanning on your local network, or am i missing something?
i am confused on this part, if anyone could help me out, i would really appreciate it!