Pivoting over internet [closed]
In a CTF, I want to attack a Bluekeep vulnerable machine over the internet using metasploit, but the problem is my Kali machine (attacker) is not exposed to the internet, so the vulnerable machine cannot send me back a reverse shell.
So I … Continue reading Pivoting over internet [closed]