maybeTHElegend
Earned a new badge!
For completing the Pivoting, Tunneling, and Port Forwarding module
Users earned this badge
Users have this badge
Completed on 24 Oct 2024
Once a foothold is gained during an assessment, it may be in scope to move laterally and vertically within a target network. Using one compromised machine to access another is called pivoting and allows us to access networks and resources that are not directly accessible to us through the compromised host. Port forwarding accepts the traffic on a given IP address and port and redirects it to a different IP address and port combination. Tunneling is a technique that allows us to encapsulate traffic within another protocol so that it looks like a benign traffic stream.