The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
Want to up your penetration testing skills and reach the dark corners of networks? Wish you knew how attackers pivot and move within networks? Are you maximizing the capabilities within SSH?
This book is packed with practical and real world examples of SSH tunneling and port redirection in multiple realistic scenarios. It walks you through the basics of SSH tunneling (both local and remote port forwards), SOCKS proxies, port redirection, and how to utilize them with other tools like proxychains, nmap, Metasploit, and web browsers.
Advanced topics included SSHing through 4 jump boxes, throwing exploits through SSH tunnels, scanning assets using proxychains and Metasploit's Meterpreter, browsing the Internet through a SOCKS proxy, utilizing proxychains and nmap to scan targets, and leveraging Metasploit's Meterpreter portfwd command. For the complete list of topics covered, check out the table of contents.
The book is a PDF packed with 80 pages of examples, code snippets, and figures to transform you into a Cyber Plumber! The book is available to download immediately after purchasing. Lastly, as part of giving back to the information technology community, this book is free for students with a .edu email!
Refund policy: No refunds. If you have a question about what content is in the book, please check out the table of contents (https://cph.opsdisk.com/pdfs/cph_table_of_contents.pdf) or send an email to firstname.lastname@example.org.
You'll need an account to access this in our app. Please create a password to continue.
Download from the App Store or text yourself a link to the app
Thanks for purchasing the The Cyber Plumber's Handbook! Let me know if you have any questions, comments, or concerns.
Good news! Since you already have a Gumroad account, it's also been added to your library.Tweet Share