Pivoting is a powerful technique in the arsenal of a web application penetration tester (pen tester). Once a host has been compromised, the pen tester looks for information to plunder. Common artifacts of interest include such things as user accounts, password hashes, and knowledge of other systems or networks that might be accessible from the host.
The pen tester might be able to use the compromised host as a bridge to pivot to another network or system that is not directly accessible from the attacking system.
https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117
#proxychains #socks #nmap #metasploit #nikto #sans #tunneling #pivoting #pentest #proxy
The pen tester might be able to use the compromised host as a bridge to pivot to another network or system that is not directly accessible from the attacking system.
https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117
#proxychains #socks #nmap #metasploit #nikto #sans #tunneling #pivoting #pentest #proxy
**visual guide to SSH tunnels**
This page explains use cases and examples of SSH tunnels while visually presenting the traffic flows.
https://robotmoon.com/ssh-tunnels/
#ssh #tunneling
This page explains use cases and examples of SSH tunnels while visually presenting the traffic flows.
https://robotmoon.com/ssh-tunnels/
#ssh #tunneling