I am new to Metasploit, so I need some expert help.
a windows/meterpreter/reverse_tcp has been created to a Windows XP PC being used as a HMI, and is working fine.
I am also pivoting the Windows XP PC route add 192.168.3.0 255.255.255.0 1.
I would like to know how I can run a nmap --script modbus and modbus-cli against some PLCs in the lab on the network 192.168.3.0/24.
can this be done?
do I need to put meterpreter into the background, if so could someone show me the steps?