#
Subnet Pivoting / Port forwarding
#
SSHuttle
To access a subnet from a compromised host.
# Usage
sshuttle -vr username@ip newsubnet
# Example
sshuttle -vr balthazar@10.10.110.100 172.16.1.0/24
#
SSH port forward
To access a port listening on the victim localhost.
# Via current SSH
user@machine:~$ ~C
ssh> -L 8001:127.0.0.1:8000
# Listen on my box port 8001 and go though 127.0.0.1:8000
# Via new SSH connection
kali@kali:~$ ssh -L 8001:127.0.0.1:8000 user@10.10.10.120