Pivoting
Introduction
Once you have owned your victim's machine, it is time to pivot to other hosts and enumerate their open ports. In this section, you will find some techniques to perform such tasks.
Ping Sweep
The easiest way to find hosts on a network can be achieved by sending ICMP requests to each host and waiting for their reply.
Windows:
Linux:
Port Scanning
Here are some "One-liners" that you can use to perform port scanning against your victim's system.
PowerShell:
Bash:
Python:
Tools
Here you have better tools to perform port scanning and ping sweep.
Last updated