Pivoting Networks Presentation

Recently I went to the Computer Sciences Department of the University of PR – Rio Piedras Campus and had a great time with the students talking about pivoting networks. I decided to share it with you … hope you enjoy it.

Abstract: When attacking a target you should never do it directly from your machine or your detection will be to easy, use proxies or network pivots to obscure your origin. Also after a successful penetration of a network a hacker (good or bad) will immediately search to move horizontally thru the network and use the existing infrastructure to pivot their attacks. Learn various ways to do this and “never” get caught.

Jose Quinones

Certificacions MCSA, CEH, GCIH, GPEN, RHCSA

Comments are closed.