Pivoting
Last updated
Last updated
Pivoting is a crucial technique in ethical hacking and penetration testing, allowing attackers to extend their reach within a network. The provided Cheatsheet outlines the process of pivoting manually, without relying on tools like Metasploit. Let's break down the steps:
Use the host_discovery.sh
script to ping all IPs on the specified network.
Example:
Utilize the port_discovery.sh
script to discover open ports on the active machines.
Example:
Download and use Chisel for port forwarding. Transfer the Chisel binary to the victim machine.
On the attacker's machine:
On the victim machine:
Create a tunnel between networks using Chisel for network pivoting.
On the attacker's machine:
Modify /etc/proxychains.conf
to use the created tunnel.
Transfer and execute the pivoting.sh
script on the victim machine.
Example: