Everyday-Cyber

  1. Pivoting using SSH
  2. Pivoting using Metasploit
  • L — used to create local forwarding
  • 8000 — port on attacker’s machine to bind
  • 10.200.48.150 — target IP in the internal network
  • id_rsa — private key
  • -f — background the shell
  • -N — indicates no command to be executed

--

--

--

An aspiring red-teamer sharing resources and knowledge to people.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How to get your WordPress website security tested?

7 Security Frameworks Every InfoSec Professional Should Know

Security Tips To Keep Your Magento Store Safe From Hackers

Vulnhub Write-up — Toppo

12 GUARDIANS NFT CARD — THE FUTURE OF NFT

DeepWeb and Darknet — Part 2

NKN Monthly Report: November 2021

Why you should just shut up if you could break RSA

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Thirukrishnan

Thirukrishnan

An aspiring red-teamer sharing resources and knowledge to people.

More from Medium

An American River

GROOVY NIGHTS

The Ex Hex by Erin Sterling #BookReview #Witches #Romance #Paranormal #Humor #TheExHex —…

Emojis mean never having to say you’re sorry (or anything else)