This is for msf6 framework
, since they have changed a lot of module names and the way you interact with them.
This is how you use autoroute & socks_proxy
in metasploit. all the online materials I found either didn't conver this whole or just plain old.
DMZ
infra but not the Coperate.10.10.51.0/24
with the our tap0
A phish user to click a browser exploit and open a Dynamic Tunnel to the Corporate enviroment which is the 10.10.51.0/24 network.
10.10.50.8
.10.10.51.21
.