YoVDO

How to Pivot Through a Network with Chisel

Offered By: John Hammond via YouTube

Tags

Network Security Courses Penetration Testing Courses Reconnaissance Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to pivot through networks using Chisel in this comprehensive 34-minute video tutorial. Explore setup, reconnaissance, static binaries, and various Chisel techniques including reverse connections, SOCKS proxies, and Proxychains. Discover how to leverage HTTP services and implement forward shells for advanced network traversal. Gain practical insights and final thoughts on effective pivoting strategies to enhance your penetration testing and network security skills.

Syllabus

- Chisel
- Setup
- Recon
- On static binaries
- Using chisel
- Put it in reverse
- Socks Proxy
- Proxychains
- HTTP service
- Forward Shell
- Final Thoughts


Taught by

John Hammond

Related Courses

Network Security
Georgia Institute of Technology via Udacity
Proactive Computer Security
University of Colorado System via Coursera
Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera
Hacker101
HackerOne via Independent
CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent