Hey, glad you're back. Looking forward to learn more about pivoting techniques! Also, if you don't mind, could you cover about evasion techniques too? And how to get initial foothold during internal pentest targetting AD environment with EDR in it.
Great video. Routing is the same thing as using chisel then? Its much easier to use it with metasploit module. But oscp doesn't allow metasploit for this. So the best option would be to use chisel and set up the proxychains.config the same way? Thanks again!
@@Zachsnotboard If you're in the DMZ, you likely won't be able to. Systems in the DMZ aren't supposed to talk to systems in the backend network. You can test for this, but that's the purpose of the DMZ.
Chisel is a great alternative to SSH here. It'll to dynamic tunneling, local port forwarding, and even reverse port forwarding. After that, the steps are exactly the same using proxychains. I'll make a video about it later down the line.
Thankful for videos that go deeper than “here is nmap you’re a hacker now”. You rock.
Hey, glad you're back. Looking forward to learn more about pivoting techniques!
Also, if you don't mind, could you cover about evasion techniques too? And how to get initial foothold during internal pentest targetting AD environment with EDR in it.
Glad to be back. Great suggestion! I'll add it to the list.
that's dope! more videos like this please.
Great video. Routing is the same thing as using chisel then? Its much easier to use it with metasploit module. But oscp doesn't allow metasploit for this.
So the best option would be to use chisel and set up the proxychains.config the same way?
Thanks again!
Yes, chisel would work just as well. I like SSH since every Linux server has it and it's very versatile.
Thank you, this was not explained well in other places with scenarios
Glad it helped!
@@NetsecExplained where I’m confused, is how you enumerate internal IPs from the DMZ
@@Zachsnotboard If you're in the DMZ, you likely won't be able to. Systems in the DMZ aren't supposed to talk to systems in the backend network. You can test for this, but that's the purpose of the DMZ.
Great video .For correct scanning results. Please perform tunneling with Chisel. Thank me later.
Chisel is a great alternative to SSH here. It'll to dynamic tunneling, local port forwarding, and even reverse port forwarding. After that, the steps are exactly the same using proxychains. I'll make a video about it later down the line.