Want to up your penetration testing skills and reach the dark corners of networks? Wish you knew how attackers pivot and move within networks? Are you maximizing the capabilities within SSH?
This book is packed with practical and real world examples of SSH tunneling and port redirection in multiple realistic scenarios. It walks you through the basics of SSH tunneling (both local and remote port forwards), SOCKS proxies, port redirection, and how to utilize them with other tools like proxychains, nmap, Metasploit, and web browsers.
Advanced topics included SSHing through 4 jump boxes, throwing exploits through SSH tunnels, scanning assets using proxychains and Metasploit's Meterpreter, browsing the Internet through a SOCKS proxy, utilizing proxychains and nmap to scan targets, and leveraging Metasploit's Meterpreter portfwd command. For the complete list of topics covered, check out the table of contents.
The book is a PDF packed with 80 pages of examples, code snippets, and figures to transform you into a Cyber Plumber! The book is available to download immediately after purchasing. Lastly, as part of giving back to the information technology community, this book is free for students with an educational/student email address!Purchase!$29.99 Free for students!
This is now required reading for every pen tester on our team. The book builds on each topic beautifully and is presented in a logical and comprehensive manner. A must for pen testers!
This book helped me understand how attackers pivot and move laterally within networks. We identified the abuse of the "netsh" technique within our network because of this book!
Utilized some of the techniques to build realistic purple teaming scenarios to improve our company's defenses.
Could not have reached the "admin" network in the OSCP (Offensive Security Certified Professional) labs without this!