πŸ”
OffSec Wiki
search
⌘Ctrlk
πŸ”
OffSec Wiki
  • Tools
  • Information Gathering
  • Exploitation
  • Cracking
  • Enumeration
  • API Sec
  • Web Pentesting
  • Linux
  • Wordpress
  • Post Exploitation
  • Persistence
  • Powershell
  • RED Teaming
  • Purple Teaming
  • Reverse Engineering
  • Pivoting
    • Port Forwarding/Redirection
    • SSH Tunneling
    • Proxychains
    • Sshuttle
    • HTTP Tunneling
    • Metasploit Pivoting
    • Ncat Pivoting
    • Chisel Pivoting
    • Pivot Suite
    • Tunna/Fulcrom (HTTP)
    • Socat
    • Ligolo-ng
    • Double Pivoting
    • How to proxy any tool
  • Metasploit
  • Networking
  • OSINT
  • Active Directory
  • Cloud
  • Containers
  • WIFI
  • Buffer Overflow
  • Code Review
  • Routers
  • Automotive CyberSec
  • Threat Modeling
  • Hardware & Lock Bypassing
  • Scripting
  • General PT Methodology
  • Blockchain
  • Challenges
  • Flipper
  • CERTS
  • Notes
  • Hacking Kubernetes
  • CV
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Pivoting

Techniques and Tools used for Pivoting

Port Forwarding/Redirectionchevron-rightSSH Tunnelingchevron-rightProxychainschevron-rightSshuttlechevron-rightHTTP Tunnelingchevron-rightMetasploit Pivotingchevron-rightNcat Pivotingchevron-rightChisel Pivotingchevron-rightPivot Suitechevron-rightTunna/Fulcrom (HTTP)chevron-rightSocatchevron-rightLigolo-ngchevron-rightDouble Pivotingchevron-rightHow to proxy any toolchevron-right
Previousgdbchevron-leftNextPort Forwarding/Redirectionchevron-right

Last updated 3 years ago