# Subnet Pivoting / Port forwarding

# SSHuttle

To access a subnet from a compromised host.

# Usage
sshuttle -vr username@ip newsubnet

# Example
sshuttle -vr balthazar@10.10.110.100 172.16.1.0/24

# SSH port forward

To access a port listening on the victim localhost.

# Via current SSH
user@machine:~$ ~C
ssh> -L 8001:127.0.0.1:8000
# Listen on my box port 8001 and go though 127.0.0.1:8000

# Via new SSH connection
kali@kali:~$ ssh -L 8001:127.0.0.1:8000 user@10.10.10.120