2.5.2 Pivoting Example (3 Targets)
What is Pivoting?
Setting Lab
Configuration of Lab





Network schema

Hostname
NAT 1
NAT 2
NAT 3
Reconnaissance
Hosts Discovery on internal network
ARP-Scan
Host and Port Discovery using scripts
Host Discovery
Linux
We can use this similar solution:
Windows
Open Ports Discovery
Linux
Windows
Host and Port Discovery using Nmap binary
Pivoting phase
Tools for Pivoting
Chisel

Attacker Machine / Server

Victim Machine / Client


Setting Proxychains

Setting Proxy (browser use)

Foxy Proxy

Use of proxychains


Socat


Setting proxychains



Reverse Shell

In addition, we can use this tool to create a powershell reverse shell for Windows machine to communicate back to attacker machine (kali).
Metasploit
Pivoting
Port Forwarding
Last updated
