Pivoting, Tunneling and Port Forwarding
âšī¸ Informations¶
- đ Website: HackTheBox
- đĨ Level: Medium
- đ Category: Offensive
- đ Link: Pivoting, Tunneling and Port Forwarding
đ Module description¶
Once a foothold is gained during an assessment, it may be in scope to move laterally and vertically within a target network. Using one compromised machine to access another is called pivoting and allows us to access networks and resources that are not directly accessible to us through the compromised host. Port forwarding accepts the traffic on a given IP address and port and redirects it to a different IP address and port combination. Tunneling is a technique that allows us to encapsulate traffic within another protocol so that it looks like a benign traffic stream.
đ Sections¶
- The Networking Behind Pivoting
- Dynamic Port Forwarding with SSH and SOCKS Tunneling
- Remote/Reverse Port Forwarding with SSH
- Meterpreter Tunneling & Port Forwarding
- Socat Redirection with a Reverse Shell
- Socat Redirection with a Bind Shell
- Web Server Pivoting with Rpivot
- Port Forwarding with Windows Netsh
- DNS Tunneling with Dnscat2
- SOCKS5 Tunneling with Chisel
- RDP and SOCKS Tunneling with SocksOverRDP
- Skills Assessment