Skip to content

Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using different approaches.

Notifications You must be signed in to change notification settings

cxnturi0n/pivoting-tunneling-lab

Repository files navigation

Hands on Pivoting, Port Forwarding and Tunneling.

Security lab showing the use of a compromised host to pivot into internal networks. It has been developed as the final exam project for the Network Security course. The goal is to compromise a web application, and later, delve deeper into the network to access hosts that you cannot directly reach from your attack host using different approaches. A full walkthrough can be downloaded here. It will demonstrate you, step by step, how to perform pivoting, port forwarding, and tunneling using different techniques and tools, while also explaining the theoretical basics behind them.

Lab overview

lab_overview

Play

You can either access the laboratory on DockerSecurityPlayground (DSP) by starting the 'NS_Pivoting_PortForwarding_Tunneling' lab or playing it directly from your Windows/Linux/MacOS host by following these simple steps:

  1. Clone or download this repo.
  2. Go inside the Lab folder.
  3. Run the containers: docker compose up -d. This may take some minutes.
  4. Connect to the kali container with a vnc client at localhost:5900, specyifing 'password' as the password.
  5. Type startxfce4 in the terminal and the xfce desktop will show up.
  6. Follow along with the documentation or simply test your pivoting skills!

About

Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using different approaches.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published