A penetration tester opened a shell on a laptop at a client's office but is unable to pivot because of restrictive ACLs on the wireless subnet. The tester is also aware that all laptop users have a hard-wired connection available at their desks. Which of the following is the BEST method available to pivot and gain additional access to the network?
surfuganda
Highly Voted 1 year, 4 months agoTiredOfTests
Highly Voted 1 year, 9 months agoKeToopStudy
1 year, 7 months ago6aba738
Most Recent 10 months, 3 weeks agob1484e5
10 months, 4 weeks agooutnumber_gargle024
1 year, 2 months agodeeden
1 year, 4 months agoBig_Dre
1 year, 5 months agoghpaoihsj
1 year, 11 months agoisaphiltrick
1 year, 11 months agoProNerd
1 year, 11 months agosolutionz
2 years agomatheusfmartins
2 years ago[Removed]
2 years, 3 months agoAaronS1990
2 years, 3 months agonickwen007
2 years, 5 months agocy_analyst
2 years, 5 months ago[Removed]
2 years, 5 months agobeamage
2 years, 5 months ago[Removed]
2 years, 5 months ago