- How tunneling works
- Running a local SSH tunnel
- Dynamic SSH tunneling
- Pivoting with Armitage and Metaspoit
- Exfiltrating using DET and DNS
- Covert exfiltration with Cachetalk
- Using PyExfil to exfiltrate over HTTPS
Skill Level Advanced
- [Malcolm] There are three advanced techniques which are useful to understand when doing pen testing or when responding to an attack. These are tunneling, pivoting, and exfiltration. Tunneling is where one protocol is used to carry traffic for another protocol. Pivoting is the technique used to burrow deeper into a network by routing through one machine to another. And exfiltration is the various ways to get information out of a network when it's been collected.
In my LinkedIn Learning course, we look at these three advanced techniques. I'm Malcolm Shore and I've spent a career helping governments and businesses protect their networks and systems against cyber attacks. Understanding how tunneling and pivoting works is valuable in diagnosing attacks, and knowing where to look for exfiltration is key to detection and damage control. As you watch the course, I'd encourage you to take the opportunity to go into the lab and follow the course material with your own hands-on testing.
It's a great way to learn. Now let's get started learning about tunneling, pivoting, and exfiltration.
Ethical Hacking: Penetration Testingwith Lisa Bock1h 26m Intermediate
Penetration Testing Essential Trainingwith Malcolm Shore2h 29m Intermediate
Penetration Testing: Advanced Kali Linuxwith Malcolm Shore2h 22m Intermediate
1. Preparing the Lab
Next steps1m 38s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.