๐ฆน
CYBERSECURITY NOTES
Ask or search...
Ctrl +โK
๐ฝ
CS && PEN-TESING NOTES
๐ฃ
Pivoting (Post Exploitation)
Using Metasploit
SOCKS, SSH - Pivoting
Remote Port Forwarding
Tool - Chisel
Chisel - Double Pivoting
Bypassing Firewall with Forward Relays
Reverse Relays - Metasploit
Previous
Rclone - Data Exfiltration
Next
Using Metasploit