rxd_txd
310 subscribers
486 photos
26 videos
22 files
2.72K links
[
{
"channel":"rxd_txd",
"info":"my bookmarks",
"feedback":"@flsixtyfour",
"topics":[
"devops",
"linux",
"sci",
"music",
"go",
"/dev/null"
]
}
]
Download Telegram
Pivoting is a powerful technique in the arsenal of a web application penetration tester (pen tester). Once a host has been compromised, the pen tester looks for information to plunder. Common artifacts of interest include such things as user accounts, password hashes, and knowledge of other systems or networks that might be accessible from the host.
The pen tester might be able to use the compromised host as a bridge to pivot to another network or system that is not directly accessible from the attacking system.

https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117

#proxychains #socks #nmap #metasploit #nikto #sans #tunneling #pivoting #pentest #proxy
**visual guide to SSH tunnels**

This page explains use cases and examples of SSH tunnels while visually presenting the traffic flows.

https://robotmoon.com/ssh-tunnels/
#ssh #tunneling