Pivoting allows attackers to use a compromised host as a gateway to access internal resources.
Create an SSH tunnel using sshuttle (Option A):
sshuttle creates a transparent VPN-like connection over SSH, allowing the tester to forward traffic securely.
Advantages:
Provides encryption, preventing IDS/IPS detection.
Requires minimal interaction with the compromised host.
[Reference: CompTIA PenTest+ PT0-003 Official Study Guide - "Pivoting and Lateral Movement Techniques", Incorrect options:, Option B (VNC server): VNC lacks encryption and is easily detectable., Option C (Metasploit listener): Reverse shells can be detected by EDR solutions., Option D (Netcat connection): Netcat is plaintext, making it highly detectable., , ]
Submit