Skip to content

Latest commit

 

History

History
8 lines (7 loc) · 185 Bytes

Pivoting.md

File metadata and controls

8 lines (7 loc) · 185 Bytes

Pivoting

  • Use compromised machines to access restricted networks.
  • Techniques:
    • SSH Tunneling
    • Proxychains
    • VPN or SOCKS proxies
  • Tools: Chisel, Ligolo, SSH, Metasploit