A penetration tester has gained a shell on a public-facing web server (10.0.0.5). During internal reconnaissance, they discover an internal network segment (192.168.1.0/24) connected to the server's second network interface. To scan this internal network from their attack machine, which technique must they employ?