🦹
CYBERSECURITY BOOK
Ask or search...
Ctrl + K
👽
CS && PEN-TESTING BOOK
🎣
Pivoting (Post Exploitation)
Using Metasploit
SOCKS, SSH - Pivoting
Remote Port Forwarding
Tool - Chisel
Chisel - Double Pivoting
Bypassing Firewall with Forward Relays
Reverse Relays - Metasploit
Previous
Rclone - Data Exfiltration
Next
Using Metasploit
Was this helpful?