NAME
Dashboard
Courses
Groups
Logout
USERS
Students Have Completed This
MODULES
Modules
49
Multiple Choice Questions
Pivoting
How to achieve this course
Content
Complete all available educational videos
Assessments
...
Pivoting 1 - Metasploit
...
Start Test
...
Pivoting 2 - SSH Local & Chisel
...
Start Test
...
Pivoting 3 - Sshuttle
...
Start Test
My Modules
Pivoting
Advanced Pivoting Scenario In a targeted network intrusion scenario, like an internal penetration test, a more advanced security professional, once successfully compromised a target using techniques such as, privilege escalation, or a well-chosen exploit may look to investigate any additional networks ranges to compromise. The strategic use of pivoting allows the security professional to re-direct their network traffic, exfiltrate data, and conduct further exploitation from their own machine. What is pivoting? Pivoting is the unique technique of using an instance (also referred to as a ‘plant’ or ‘foothold’) to be able to “move” around inside a network. Using the first compromise to allow and even aid in the compromise of other otherwise inaccessible systems. Pivoting comes with several techniques, such as, applying encryption to hide our tracks from network monitoring services, utilising different toolsets to allow for cross-compatibility; for example, targeting a Windows operating system but pivoting with a Linux based machine. Additionally, there is the need to decide how to apply the toolsets, do we need to use a framework, like Metasploit? Or is there the possibility of using standalone binaries. How will we use pivoting on the course? In this course, we will show you a number of tools and techniques to have the ability to pivot through a tiered-network to reach new network ranges and how to exploit targets within the newly found networks. This includes: - Static SSH - Dynamic SSH - Pivoting with Metasploit - Using SShuttle - Using Chisel
Mark as Complete
Identifying Pivot Point
An enumeration and exploitation walkthrough, of a victim machine that has multiple IP Addresses and can therefore be used as a pivot point
Mark as Complete
Metasploit Port Scanning Module
Mark as Complete
Working With Proxy Chains
Mark as Complete
Metasploit NC_Vsftpd
Mark as Complete
Metasploit Exploiting Pivot
Mark as Complete
SSH Local
Mark as Complete
SSH DynamicDFlag
Mark as Complete
SShuttle
Mark as Complete
Chisel
Mark as Complete
Advanced
Course Level
Take the Test
Pivoting 1 - Metasploit
When ready you can take this test!
Start Test
Pivoting 2 - SSH Local & Chisel
When ready you can take this test!
Start Test
Pivoting 3 - Sshuttle
When ready you can take this test!
Start Test
More Courses
OSINT Fundamentals
December 13, 2023
Intro to Scanning
December 12, 2023
Intro to Scripting
December 12, 2023
Intro to Metasploit
December 12, 2023
Congratulations
NAME
You have successfully completed the
Pivoting
course!
Back to Dashboard
Go to My Badges