Oldschool Passenger: Network Pivoting with PeerVPN PeerVPN is an older solution for building VPNs, but even it can be used to pivot through an external compromised host
Strider: Network Pivoting with Nebula I have published an article on pivoting techniques using the Nebula tool. The article uses the concept of "Living off the Land" so that there is an attempt to avoid detection by defense systems
Renegade: Network Pivoting with SoftEther SoftEther finds various uses in production, but in this article I will demonstrate a way to network infrastructure deployment in a pentest scenario
Defect VIP: Pivoting on Linux with TailScale In this article, I will demonstrate a method of pivoting on Linux using TailScale to get into the internal infrastructure. One of the Living off the land techniques.
Defect: Pivoting on Windows with TailScale Pivoting is one of the stages of post-exploitation, in a sense it is extreme network administration. In my article I will demonstrate pivoting on Windows using TailScale
Witchhammer VIP: NAT bypass for pivoting on Windows NAT can cause problems for a pentester when pivoting, especially if we are talking about compromised Windows machines. In this article, I will continue to demonstrate the concept of L2 tunneling against compromised Windows machines, but with NAT in mind
Apostroph: Pivoting on Linux with ZeroTier Pivoting is a specific phenomenon in which an attacker expands his presence in the network. In my article, I will demonstrate a method of moving around the network using ZeroTier.
Witchhammer: Windows post-exploitation using virtual VPN channels Pivoting against Windows is a fairly complex post-exploitation process. In this article I will demonstrate my new method of link layer pivoting using SoftEther and without a virtual machine
Windows Nightmare: Extreme Pivoting against Windows This is a research about a specific vector of Windows post-exploitation using OpenWRT