Using Sshuttle to Pivot Across Networks

preview_player
Показать описание
A common problem when attacking a network is pivoting to an internal network once an external-facing machine has been compromised. Sshuttle makes this easy to do across a Linux machine that accepts SSH connections.

If you found this video helpful and would like to support future creations, please considering visiting the following links:
Рекомендации по теме
Комментарии
Автор

I'm in the middle of an exam and hadn't done much pivoting, this video got me working perfectly. Thanks!

Zen_Monkey
Автор

Thank you for this. I am 99% on my OSCP journey but was having trouble doing this technique using chisel. Blessings

gustanini
Автор

This is a great video - covers the topic in detail, but short and to the point. Great speaking skills too. 10/10!

JustMakeIt_YT
Автор

Killer. No bs. Technical yet super easy to follow.

Jesse_Johnson
Автор

Excellent video thank you so much Conda 😁!!

unknown_exploit
Автор

what if the edge machine only can be logged in through rsa key?

sappi_
Автор

I managed to access a license server from a different network by using this method. Thanks for uploading this demo. It's super helpful!

sssy
Автор

Just found this channel. Very useful stuff. I like the structure of your channel too! I'll be learning a lot from you the next few following days :)

Cossaw
Автор

Nice video, saved my ass in the OSCP labs

andyli
Автор

I don't know jack about this stuff, but you do a great job explaining

NewTubersChannel
Автор

Very good video, it now looks so simple to use!

jaylal
Автор

this was amazing means how you describe all the things are beyond the point, keep it up

pentestsky
Автор

Great tool explained easily... thanks sir ..helpful in getting certs

gowthamnaiduponnana
Автор

What to do in case when there is not SSH in Edge Machine. But SSH is possible in Internal Network.
I am stuck in this situation. I am able to access the Edge Machine by os-command execution reverse shell / nc reverse shell.

iakashx
Автор

Great great stuff man we need more stuff like this

jacobnapkins
Автор

Thanks, another great video. sshuttle seems so simple compared to proxychains. What can proxychains do that sshuttle can't?

ayodub
Автор

I have a question can I do it with MITM program like ettercap using sshuttle because it requires a network interface to let the victim which is a VPN client and the attacker as VPN server. This feature was only included in Cobalt Strike and Metasploit Pro. I've seen PPTP VPN PoC metasploit video and it was possible but I wonder if it's going to work with IPSec/IKEv2 and sshuttle. I like the video so this what's in my mind like how an attacker will configure a target's machine to pivot and sniff the network with external MITM tools.

hewfrebie
Автор

Sir can u tell me how to transer tools and other things to victim machine using this tool

gowthamnaiduponnana
Автор

Wow - this was such a fantastic video. Were you following a script? You speak really clear and well! Absolutely fantastic! I will be using this straight away to pivot around the OSCP labs. Any more OSCP related videos soon? Would love to see some more reporting related videos. Thanks so much!

sudonoodle
Автор

Hi Conda, I found this vid very helpful but unfortunately when Im trying to do it I have this errors

Traceback (most recent call last):
File "<string>", line 1, in ?
File "assembler.py", line 27, in ?
File "sshuttle.helpers", line 97
except OSError as e:
^
SyntaxError: invalid syntax
c : fatal: c : server died with error code 1


---

here is my syntax

thenetworkoddmin