Hey, glad you're back. Looking forward to learn more about pivoting techniques! Also, if you don't mind, could you cover about evasion techniques too? And how to get initial foothold during internal pentest targetting AD environment with EDR in it.
@@Zachsnotboard If you're in the DMZ, you likely won't be able to. Systems in the DMZ aren't supposed to talk to systems in the backend network. You can test for this, but that's the purpose of the DMZ.
Great video. Routing is the same thing as using chisel then? Its much easier to use it with metasploit module. But oscp doesn't allow metasploit for this. So the best option would be to use chisel and set up the proxychains.config the same way? Thanks again!
Chisel is a great alternative to SSH here. It'll to dynamic tunneling, local port forwarding, and even reverse port forwarding. After that, the steps are exactly the same using proxychains. I'll make a video about it later down the line.
Thankful for videos that go deeper than “here is nmap you’re a hacker now”. You rock.
My guy I have been on the struggle bus trying to wrap my head around this on htb. Your video was a great breakdown. Thank you
Hey, glad you're back. Looking forward to learn more about pivoting techniques!
Also, if you don't mind, could you cover about evasion techniques too? And how to get initial foothold during internal pentest targetting AD environment with EDR in it.
Glad to be back. Great suggestion! I'll add it to the list.
that's dope! more videos like this please.
Thank you, this was not explained well in other places with scenarios
Glad it helped!
@@NetsecExplained where I’m confused, is how you enumerate internal IPs from the DMZ
@@Zachsnotboard If you're in the DMZ, you likely won't be able to. Systems in the DMZ aren't supposed to talk to systems in the backend network. You can test for this, but that's the purpose of the DMZ.
Great video. Routing is the same thing as using chisel then? Its much easier to use it with metasploit module. But oscp doesn't allow metasploit for this.
So the best option would be to use chisel and set up the proxychains.config the same way?
Thanks again!
Yes, chisel would work just as well. I like SSH since every Linux server has it and it's very versatile.
Great video .For correct scanning results. Please perform tunneling with Chisel. Thank me later.
Chisel is a great alternative to SSH here. It'll to dynamic tunneling, local port forwarding, and even reverse port forwarding. After that, the steps are exactly the same using proxychains. I'll make a video about it later down the line.