Pivot Techniques

https://cyberdefense.orange.com/fr/blog/etat-de-lart-du-pivoting-reseau-en-2019/

Proxychains Pivot

#  When you have access to a machine, you can use it as pivot to target machines

# Getting known machines
arp -a

# Setup SSH Dynamic on the attacking box
ssh -D <local_port> <user>@<ip> #sock4 on port 1337 is what I have setup

# Setup proxychains in /etc/proxychains.conf
[ProxyList]
socks4 127.0.0.1 <local_port>

# Reduce timeout in /etc/proxychains.conf to gain speed
tcp_read_time_out 800
tcp_connect_time-out 800

# Then
proxychains...

Double Pivot Proxychains

Port Forwarding

SSH Pivoting

sshuttle

Metasploit pivoting

Ncat pivoting

Chisel Pivoting (HTTP Tunnel)

PivotSuite

Tunna / Fulcrom (HTTP)

Last updated