Launching HTB CWEE: Certified Web Exploitation Expert Learn More


Earned a new badge!

Badge Icon

Explore deep space

For completing the Pivoting, Tunneling, and Port Forwarding module


Users earned this badge


Users have this badge

Completed on 26 Sep 2023

Pivoting, Tunneling, and Port Forwarding

Once a foothold is gained during an assessment, it may be in scope to move laterally and vertically within a target network. Using one compromised machine to access another is called pivoting and allows us to access networks and resources that are not directly accessible to us through the compromised host. Port forwarding accepts the traffic on a given IP address and port and redirects it to a different IP address and port combination. Tunneling is a technique that allows us to encapsulate traffic within another protocol so that it looks like a benign traffic stream.