Pivoting Guides & Notes
- https://www.offensive-security.com/metasploit-unleashed/portfwd/
- https://www.offensive-security.com/metasploit-unleashed/proxytunnels/
- https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117
- https://pentest.blog/explore-hidden-networks-with-double-pivoting/
- https://blog.techorganic.com/2012/10/10/introduction-to-pivoting-part-2-proxychains/
- https://www.cobaltstrike.com/help-socks-proxy-pivoting
- https://sathisharthars.com/2014/07/07/evade-windows-firewall-by-ssh-tunneling-using-metasploit/
- https://artkond.com/2017/03/23/pivoting-guide/
- https://blog.cobaltstrike.com/2014/10/14/how-vpn-pivoting-works-with-source-code/
- https://www.trustedsec.com/2014/12/ms14-068-full-compromise-step-step/
Pivoting Tools
https://github.com/rofl0r/proxychains-ng
https://github.com/0x36/VPNPivot
https://github.com/rsmudge/Layer2-Pivoting-Client