Skip to main content

Tunneling

Firewall Bypass Techniques: Tools and Best Practices

··3471 words·17 mins· loading · loading
This technical article provides a detailed overview of various techniques and tools that can be used to bypass firewalls, including examples and best practices for red teamers and pen testers.

SharpSocks: A .NET-Based Proxy for Red Teaming and Network Penetration Testing

··1022 words·5 mins· loading · loading
SharpSocks is a powerful .NET-based proxy tool for red teaming and network penetration testing that enables encrypted communications, protocol obfuscation, and access to internal resources, providing professional hackers with stealth and persistence in their engagements.

Chisel: The Stealthy Architect of Network Tunnels

··838 words·4 mins· loading · loading
A comprehensive deep-dive into Chisel, the ultimate tool for bypassing network restrictions via SSH-over-HTTP. Learn how to master forward and reverse tunnels, establish stealthy SOCKS proxies, harden your infrastructure with TLS, and change the source code for evasion.

The Ghost in the Machine: Using xfreerdp and Pass-the-Hash for RDP

··974 words·5 mins· loading · loading
A deep-dive into the technical requirements and execution of Pass-the-Hash for Remote Desktop Protocol (RDP). Learn the correct xfreerdp syntax, how to enable Restricted Admin Mode remotely, troubleshoot NLA errors, and understand the forensic “Type 3” logon anomaly.

Mastering the Maze: Advanced Tunneling and Port Redirection for Red Team Operators

··1213 words·6 mins· loading · loading
A deep-dive guide into advanced network tunneling techniques. Learn to combine Iptables, SSH (Local, Remote, Dynamic, and Reverse Dynamic), Windows Netsh, and Socat to bypass firewalls, pivot through sophisticated network segments, and maintain a low profile during engagements. Now covers modern tools like Chisel and Ligolo-ng.

Port Scanning on Linux and Windows - The Ultimate Guide

··1231 words·6 mins· loading · loading
A comprehensive guide to mastering port scanning on both Linux and Windows, covering standard tools like Nmap, stealthy built-in techniques, and modern PowerShell-based enumeration.