A pentester is using Metasploit to exploit an FTP server and pivot to a LAN. How will the pentester
pivot using Metasploit?
A.
Issue the pivot exploit and set the meterpreter.
B.
Reconfigure the network settings in the meterpreter.
C.
Set the payload to propagate through the meterpreter.
D.
Create a route statement in the meterpreter.
D