Pivoting and Post-Explotation (Spanish)
This video (Spanish) corresponds to a talk offered during the last RootedCon in Madrid and published by the pentester.es blog. It shows different techniques to perform pivoting through systems in a pentest.
José Selvi - Unprivil eged Network Post-Exploitation (Rooted CON 2011) from rootedcon on Vimeo.
I found particularly interesting the mention of the &nbs p;command line kung fu blog.
Props to Paul Asadooria n, Ed Skoudis, Hal Pomeranz and Tim Medin :)
At the end of the video, there is a nice dem o that uses some shell fu to discover servers in the internal network and setup the forwards in Metasploit. Sweet!