Martian Defense NoteBook
Ctrlk
  • Martian Defense Notebook
  • Training and Career
    • Keeping it Real for Beginners
    • Cybersecurity Domains
    • Reading and Repos
    • Media
    • Guides
    • Platforms
  • Technical Resources
    • Application Security
    • Recon + OSINT
    • Offensive-Cybersecurity
    • Defensive-Cybersecurity
    • Cheatsheets
    • General Cybersecurity
    • Coding/Programming
    • Reverse Engineering
    • AI for cybersecurity
  • Notes
    • Product Security Engineering
    • AppSec Testing
    • Security Research
    • Coding/Programming
    • Network Security
      • Domain Trust Enumeration
      • Bleeding Edge Vulnerabilities
      • Post-Exploitation
      • Access Control Lists and Entries (ACL & ACE)
      • Credentialed Enumeration
      • Password Attacks
      • PowerView
      • Pivoting, Tunneling and Forwarding
        • Advanced Tunneling Methods
        • Dynamic Port Forwarding (SSH + Socks)
        • Port Forwarding Tools
        • SoCat
      • Linux Privilege Escalation
      • Windows Privesc
      • Kerberos Attacks
      • Pentesting JumpCloud vs Active Directory (AD) vs Azure ADDS
    • Cloud Security Testing
    • Offensive Security
    • Defensive Security
    • Governance, Risk, Compliance
    • Capture-the-Flag Training
    • Reporting
    • Common System Task Info
    • App Pentest Toolkit
  • Digital Privacy
    • Personal Information Removal Services
    • Privacy-Focused DNS Configuration Guides
    • Public DNS Services
    • Privacy and Opsec Resources
    • Self-Hosting
    • Monero Mining Guide
    • Android OSes
  • Cyber Entreprenuership
    • Entrepreneurship Roadmaps
    • Open Source Business & SaaS Tools
Powered by GitBook
On this page
  1. Notes
  2. Network Security

Pivoting, Tunneling and Forwarding

Advanced Tunneling MethodsDynamic Port Forwarding (SSH + Socks)Port Forwarding ToolsSoCat
PreviousPowerViewNextAdvanced Tunneling Methods

Last updated 11 months ago