Pivoting
Pivoting is a crucial technique in ethical hacking and penetration testing, allowing attackers to extend their reach within a network. The provided Cheatsheet outlines the process of pivoting manually, without relying on tools like Metasploit. Let's break down the steps:
1. Discover Active Machines
Use the
host_discovery.sh
script to ping all IPs on the specified network.Example:
2. Discover Open Ports
Utilize the
port_discovery.sh
script to discover open ports on the active machines.Example:
3. Port Forwarding with Chisel
Download and use Chisel for port forwarding. Transfer the Chisel binary to the victim machine.
On the attacker's machine:
On the victim machine:
4. Tunneling Networks
Create a tunnel between networks using Chisel for network pivoting.
On the attacker's machine:
Modify
/etc/proxychains.conf
to use the created tunnel.
Automation with Pivoting_Enum Bash Script
Transfer and execute the
pivoting.sh
script on the victim machine.Example:
Last updated