• OSCP - Useful Resources
  • Introduction
  • Information Gathering/Reconnaissance
  • Port Scanning
  • Backdoors/Web Shells
  • Local File Inclusion/Remote File Inclusion
  • Shell Spawning
  • Windows Privilege Escalation
  • Linux Privilege Escalation
  • Fuzzing Payloads
  • Metasploit
  • MSFVenom
  • File Transfer
  • Samba (SMB)
  • Windows Post-Exploitation
  • Linux Post-Exploitation
  • Pivoting
  • Buffer Overflows
  • Remote Desktop Protocol (RDP)
  • SQL Injection
  • Password Cracking
  • Pre-Exam Prep
  • Cross-Compilation
  • Jailed Shell Escape
  • General Notes
Powered by GitBook

Pivoting

Pivoting

  1. https://www.offensive-security.com/metasploit-unleashed/portfwd/
  2. https://www.offensive-security.com/metasploit-unleashed/proxytunnels/
  3. https://github.com/rofl0r/proxychains-ng
  4. https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117
  5. https://pentest.blog/explore-hidden-networks-with-double-pivoting/
  6. https://blog.techorganic.com/2012/10/10/introduction-to-pivoting-part-2-proxychains/
  7. https://www.cobaltstrike.com/help-socks-proxy-pivoting
  8. https://sathisharthars.com/2014/07/07/evade-windows-firewall-by-ssh-tunneling-using-metasploit/
  9. https://artkond.com/2017/03/23/pivoting-guide/

results matching ""

    No results matching ""