bars
🦹
CYBERSECURITY BOOK
search
circle-xmark
⌘
Ctrl
k
github
Edit
chevron-down
👽
CS && PEN-TESTING BOOK
🎣
Pivoting (Post Exploitation)
cow
Using Metasploit
chevron-right
table-pivot
SOCKS, SSH - Pivoting
chevron-right
house-laptop
Remote Port Forwarding
chevron-right
squirrel
Tool - Chisel
chevron-right
squirrel
Chisel - Double Pivoting
chevron-right
forward
Bypassing Firewall with Forward Relays
chevron-right
backward-fast
Reverse Relays - Metasploit
chevron-right
l
Pivoting using Ligolo-Ng
chevron-right
Previous
VPN Hacking: How VPN’s Work
chevron-left
Next
Using Metasploit
chevron-right
sun-bright
desktop
moon
sun-bright
desktop
moon