Pivoting with Proxychains
- by Vince
-
in Blog
-
Hits: 539
Let's say we have a small hole into an environment, like a web server sitting behind the firewall with a port open to the Internet. We compromise the web server and from the web server, we can see other targets in the environment but we are unable to see those targets directly from our attacking machine. We need a way of pivoting through that web server in order to attack those targets and that's where we can use Proxychains.
In this first image, I'm getting ahead of myself a little bit but I wanted to paint the picture.