Tunneling Through Protected Networks | Master Network Pivoting

แชร์
ฝัง
  • เผยแพร่เมื่อ 25 พ.ย. 2024

ความคิดเห็น • 13

  • @Jesse_Johnson
    @Jesse_Johnson 8 หลายเดือนก่อน +1

    Thankful for videos that go deeper than “here is nmap you’re a hacker now”. You rock.

  • @kahzoot
    @kahzoot 11 วันที่ผ่านมา

    My guy I have been on the struggle bus trying to wrap my head around this on htb. Your video was a great breakdown. Thank you

  • @wolfrevokcats7890
    @wolfrevokcats7890 ปีที่แล้ว +2

    Hey, glad you're back. Looking forward to learn more about pivoting techniques!
    Also, if you don't mind, could you cover about evasion techniques too? And how to get initial foothold during internal pentest targetting AD environment with EDR in it.

    • @NetsecExplained
      @NetsecExplained  ปีที่แล้ว +2

      Glad to be back. Great suggestion! I'll add it to the list.

  • @zix655
    @zix655 ปีที่แล้ว +1

    that's dope! more videos like this please.

  • @Zachsnotboard
    @Zachsnotboard 5 หลายเดือนก่อน

    Thank you, this was not explained well in other places with scenarios

    • @NetsecExplained
      @NetsecExplained  5 หลายเดือนก่อน

      Glad it helped!

    • @Zachsnotboard
      @Zachsnotboard 5 หลายเดือนก่อน

      @@NetsecExplained where I’m confused, is how you enumerate internal IPs from the DMZ

    • @NetsecExplained
      @NetsecExplained  5 หลายเดือนก่อน +1

      @@Zachsnotboard If you're in the DMZ, you likely won't be able to. Systems in the DMZ aren't supposed to talk to systems in the backend network. You can test for this, but that's the purpose of the DMZ.

  • @Noflexing100
    @Noflexing100 ปีที่แล้ว

    Great video. Routing is the same thing as using chisel then? Its much easier to use it with metasploit module. But oscp doesn't allow metasploit for this.
    So the best option would be to use chisel and set up the proxychains.config the same way?
    Thanks again!

    • @NetsecExplained
      @NetsecExplained  ปีที่แล้ว

      Yes, chisel would work just as well. I like SSH since every Linux server has it and it's very versatile.

  • @felixkiprop48
    @felixkiprop48 ปีที่แล้ว

    Great video .For correct scanning results. Please perform tunneling with Chisel. Thank me later.

    • @NetsecExplained
      @NetsecExplained  ปีที่แล้ว +2

      Chisel is a great alternative to SSH here. It'll to dynamic tunneling, local port forwarding, and even reverse port forwarding. After that, the steps are exactly the same using proxychains. I'll make a video about it later down the line.