Pivot Techniques
https://cyberdefense.orange.com/fr/blog/etat-de-lart-du-pivoting-reseau-en-2019/
Proxychains Pivot
# When you have access to a machine, you can use it as pivot to target machines
# Getting known machines
arp -a
# Setup SSH Dynamic on the attacking box
ssh -D <local_port> <user>@<ip> #sock4 on port 1337 is what I have setup
# Setup proxychains in /etc/proxychains.conf
[ProxyList]
socks4 127.0.0.1 <local_port>
# Reduce timeout in /etc/proxychains.conf to gain speed
tcp_read_time_out 800
tcp_connect_time-out 800
# Then
proxychains...Double Pivot Proxychains
Port Forwarding
SSH Pivoting
sshuttle
Metasploit pivoting
Ncat pivoting
Chisel Pivoting (HTTP Tunnel)
PivotSuite
Tunna / Fulcrom (HTTP)
Last updated