Hello everyone. Have some new videos posted about ssh tunneling and pivots.
Let me know what you think and if have any suggestions.
Link to De-ICE
SSH -L localport:targetip:targetport username@pivotmachine
ncat 127.0.0.1 localport
nmap -sV -p[localport] 127.0.0.1
Just as a note - after watching this, i stumbled upon a pivoting method using ssh -D to setup a SOCKS server on the compromised machine, and then using proxychains to tunnel nmap over that.
This method allows scanning the entire network, without needing to setup ssh for different ports/ips etc.
I need to update this video or create a new one to show some methods I lack in this video. Thanks for the post I will try to get a updated version for people to reference with better content.
Nice article and perfect posting, I really appreciatedReplyDelete
Kodokijo - get4best.com