πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
    • Chisel
    • DNS Tunneling (TCP over DNS)
    • Dnscat2
    • Double Pivot
    • Enumeration
    • Evil-WinRM
    • HTTP Tunneling
    • Icmptunnel (ICMP Tunneling)
    • Internal Web Pages Access
    • Ligolo-ng
    • Metasploit
    • Netsh
    • Ngrok
    • Plink
    • Proxychains
    • RDP Hijacking
    • Resources
    • Reverse Shells from Internal Networks
    • Revsocks
    • Rpivot
    • SSH Reverse Connections
    • SSH Tunneling-Port Forwarding
    • SSH Windows
    • Socat
    • Sshuttle
    • VPN Tunnel
    • VPN over SSH
    • Webshell Pivot
    • Wstunnel
    • xFreeRDP
    • Techniques
      • Border Gateway Protocol Hijacking (BGP)
      • PORT FORWARDING EXPLANATION:
      • TUNNELING/PROXYING EXPLANATION:
      • Various Pivoting Techniques
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
  • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Pivoting

Techniques

Border Gateway Protocol Hijacking (BGP)chevron-rightPORT FORWARDING EXPLANATION:chevron-rightTUNNELING/PROXYING EXPLANATION:chevron-rightVarious Pivoting Techniqueschevron-right
PreviousxFreeRDPchevron-leftNextBorder Gateway Protocol Hijacking (BGP)chevron-right

Last updated 8 months ago