🐲
OSCP Notes
  • 🐲OSCP Notes
  • 🐲OSCP Methodology
  • 💡Misc
    • Metasploit
    • Antivirus Evasion
    • Password attacks
    • Reverse Shells
    • Port Forwarding, Tunneling and Pivoting
      • Local Port Forwarding
      • Remote Port Forwarding
      • Dynamic Port Forwarding
      • Lingolo-ng
    • Information Gathering
      • Passive Reconnaissance
        • Whois
        • Google Dorks
        • NetCraft
        • Git Repository
      • Active Reconnaissance
        • DNS Enumeration
        • Host Discovery
        • Port scanning
        • SMTP - 25
        • SNMP
  • Linux
    • Local Enumeration
    • Local Privileges Escalation
      • Scheduled tasks
      • Password Authentication
      • Monitor Processes
      • SetUID Binaries and Capabilities
      • Sudoers
      • Kernel Exploits
  • Windows
    • 🧠Mindmap
    • 🥝Mimikatz Basics
    • Enumeration
      • External Enumeration
      • Local Enumeration
      • Active Directory
        • PowerView
    • NTLM Hashes
    • Local Privilege Escalation
      • Service Binary Hijacking
      • Service DLL Hijacking
      • Unquoted Service Paths
      • Scheduled Tasks
      • Token impersonation
      • Backup Operators Group
    • Lateral Movement
      • WMI and WinRM
      • PsExec
      • Pass The Hash
      • Overpass The Hash
      • Pass The Ticket
      • DCOM
    • Persistence
      • Golden Ticket
      • Shadow Copy
    • Authentication Attacks
      • AS-REP Roasting
      • Kerberoasting
      • Password Spray
      • Silver Ticket
      • DC Sync
    • Client Side
    • NTLM Authentication
    • Kerberos Authentication
    • Cached Credentials
  • Web attacks
    • WordPress
    • SQL Injection (SQLi)
    • Command Injection
    • Directory Traversal
    • Local File Inclusion (LFI)
    • File Upload
Powered by GitBook
On this page
  • Tunneling
  • Port Forwarding
  • Pivoting
  1. Misc

Port Forwarding, Tunneling and Pivoting

Tunneling

Transferring data using a certain protocol by encapsulating it in another protocol. This can be used for encrypted transmission of information.

For instance, if we want to communicate with a machine we reached without the firewall dropping the packet, we can obscure it by creating a tunnel using a protocol that passes through the firewall’s filtering.

Port Forwarding

A method that allows us, as attackers, to transfer data from one port to another.

This helps us by allowing access to internal resources whose ports are filtered through a machine we’ve successfully compromised.

Pivoting

When we've gained our foothold and want to access more internal networks in the organization, we need to reach our pivot host, which will lead us to another segment in the network, allowing us to go deeper.

For example: When we gain control over a host and want to explore more stations in the organization, and we find an IT manager's machine with multiple network interfaces, it can serve as a pivot point, enabling us to advance further into the next network, and so on.

PreviousReverse ShellsNextLocal Port Forwarding

Last updated 8 months ago

💡