The Cyber Plumber’s Handbook: The definitive guide to SSH tunneling, port redirection, and bending traffic like a boss.

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The Cyber Plumber's Handbook The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss. Want to up your penetration testing skills and reach the dark corners of networks? Wish you knew how attackers pivot and move within networks? Are you maximizing the capabilities within SSH? This book is packed with practical and real world examples of SSH tunneling and port redirection in multiple realistic scenarios. It walks you through the basics of SSH tunneling (both local and remote port forwards), SOCKS proxies, port redirection, and how to utilize them with other tools like proxychains, nmap, Metasploit, and web browsers. Advanced topics included SSHing through 4 jump boxes, throwing exploits through SSH tunnels, scanning assets using proxychains and Metasploit's Meterpreter, browsing the Internet through a SOCKS proxy, utilizing proxychains and nmap to scan targets, and leveraging Metasploit's Meterpreter portfwd command. For the complete list of topics covered, check out the table of contents. The book is a PDF packed with 80 pages of examples, code snippets, and figures to transform you into a Cyber Plumber! The book is available to download immediately after purchasing. Lastly, as part of giving back to the information technology community, this book is free for students with a .edu email!

Author(s): Brennon Thomas
Edition: 1.2
Publisher: Opsdisk LLC
Year: 2019

Language: English
Pages: 80

1.2 Intended Audience......Page 7
1.4 Thanks and Contact Information......Page 8
2.3 Linux BASH aliases......Page 9
2.4 Windows Doskey Macros (aka Windows aliases)......Page 10
2.5.2 SSH Client......Page 12
2.5.3 Netcat......Page 13
2.6.2 House Analogy......Page 14
3.2 First Connection......Page 17
3.3 Netcat Chat......Page 18
3.5 Gophish Admin Panel......Page 19
3.6 Ghost Blog Admin Panel......Page 21
4.1 Overview......Page 23
4.3 SSH to Linux Target......Page 24
4.4 SSH Tunnels, within Tunnels, within Tunnels......Page 25
4.5 Remote Desktop Protocol through a Jumpbox......Page 27
4.6 Web Browsing......Page 29
4.7 Throwing Exploits......Page 31
5.2 First Connection......Page 35
5.3 Netcat Chat......Page 36
5.4 Scantron Agent Tunnels......Page 37
6.2 Netcat Chat......Page 41
6.3 WWW Server to 127.0.0.1......Page 42
6.4 Exploit Callbacks Using -R......Page 43
7.3 Netcat Chat......Page 47
7.4 Web Browsing......Page 49
7.4.2 Chrome......Page 50
7.5 curl......Page 51
7.6 nmap Scanning......Page 52
7.7 Wfuzz Web Directory Brute Forcing......Page 53
8.2 Linux Redirector - redir......Page 55
8.3 Linux Redirector - rinetd......Page 56
8.4 Windows Redirector - netsh......Page 57
8.5 netsh + Meterpreter = <3......Page 59
8.6 Windows Redirector - fpipe......Page 60
8.7 Windows Redirector - winrelay......Page 61
8.8 Shadowsocks - An SSH -D Alternative......Page 62
8.9 Sharing Port Forwards and SOCKS Proxies......Page 64
8.10 Meterpreter portfwd Module......Page 65
8.11 Metasploit SOCKS Proxies......Page 67
8.12 Privilege Escalation......Page 71
9.3 Chapter Photos......Page 77
9.4 Change Log......Page 78
Index......Page 79