Skip to content

Pivoting, Tunneling and Port Forwarding

â„šī¸ Informations


📜 Module description

Once a foothold is gained during an assessment, it may be in scope to move laterally and vertically within a target network. Using one compromised machine to access another is called pivoting and allows us to access networks and resources that are not directly accessible to us through the compromised host. Port forwarding accepts the traffic on a given IP address and port and redirects it to a different IP address and port combination. Tunneling is a technique that allows us to encapsulate traffic within another protocol so that it looks like a benign traffic stream.


📋 Sections

  1. The Networking Behind Pivoting
  2. Dynamic Port Forwarding with SSH and SOCKS Tunneling
  3. Remote/Reverse Port Forwarding with SSH
  4. Meterpreter Tunneling & Port Forwarding
  5. Socat Redirection with a Reverse Shell
  6. Socat Redirection with a Bind Shell
  7. Web Server Pivoting with Rpivot
  8. Port Forwarding with Windows Netsh
  9. DNS Tunneling with Dnscat2
  10. SOCKS5 Tunneling with Chisel
  11. RDP and SOCKS Tunneling with SocksOverRDP
  12. Skills Assessment