Tunneling Through Protected Networks | Master Network Pivoting

Поделиться
HTML-код
  • Опубликовано: 29 окт 2024

Комментарии • 12

  • @Jesse_Johnson
    @Jesse_Johnson 7 месяцев назад +1

    Thankful for videos that go deeper than “here is nmap you’re a hacker now”. You rock.

  • @wolfrevokcats7890
    @wolfrevokcats7890 Год назад +2

    Hey, glad you're back. Looking forward to learn more about pivoting techniques!
    Also, if you don't mind, could you cover about evasion techniques too? And how to get initial foothold during internal pentest targetting AD environment with EDR in it.

    • @NetsecExplained
      @NetsecExplained  Год назад +2

      Glad to be back. Great suggestion! I'll add it to the list.

  • @zix655
    @zix655 Год назад +1

    that's dope! more videos like this please.

  • @Noflexing100
    @Noflexing100 Год назад

    Great video. Routing is the same thing as using chisel then? Its much easier to use it with metasploit module. But oscp doesn't allow metasploit for this.
    So the best option would be to use chisel and set up the proxychains.config the same way?
    Thanks again!

    • @NetsecExplained
      @NetsecExplained  Год назад

      Yes, chisel would work just as well. I like SSH since every Linux server has it and it's very versatile.

  • @Zachsnotboard
    @Zachsnotboard 4 месяца назад

    Thank you, this was not explained well in other places with scenarios

    • @NetsecExplained
      @NetsecExplained  4 месяца назад

      Glad it helped!

    • @Zachsnotboard
      @Zachsnotboard 4 месяца назад

      @@NetsecExplained where I’m confused, is how you enumerate internal IPs from the DMZ

    • @NetsecExplained
      @NetsecExplained  4 месяца назад +1

      @@Zachsnotboard If you're in the DMZ, you likely won't be able to. Systems in the DMZ aren't supposed to talk to systems in the backend network. You can test for this, but that's the purpose of the DMZ.

  • @felixkiprop48
    @felixkiprop48 Год назад

    Great video .For correct scanning results. Please perform tunneling with Chisel. Thank me later.

    • @NetsecExplained
      @NetsecExplained  Год назад +2

      Chisel is a great alternative to SSH here. It'll to dynamic tunneling, local port forwarding, and even reverse port forwarding. After that, the steps are exactly the same using proxychains. I'll make a video about it later down the line.