Background#
Yes, I titled it "Port Forwarding and Internal Proxy" and boasted about it.
After countless failed attempts to write it, I left it for half a year.
Thanks to the three classmates who urged me to update it, I had the motivation to continue.
I gave up on the idea of covering such a large topic in one article and decided to focus on individual tools.
By introducing one tool and technique per article, I will explain the important content of "Proxies and Forwarding."
This article serves as the general chapter for this series of articles (I'm starting to make promises again).
Introduction to Concepts#
Internal Proxy#
In the process of daily penetration testing, when obtaining a shell, often due to insufficient privileges, one cannot make any sudden moves. In order to leave fewer traces and further penetrate the internal network for various reasons, it is necessary to integrate one's own penetration environment into the target's network. This is called an internal proxy.
Port Forwarding#
Internal Proxy Tools#
Although adjustments are often necessary based on the actual environment, it is still possible to roughly prioritize various common tools based on convenience, stability, practicality, and other factors (this is only a personal opinion, suggestions are welcome in the comments section).