For more information on the topics discussed in this chapter, visit the following links:
- A Red Teamer's guide to pivoting: https://artkond.com/2017/03/23/pivoting-guide/
- SSH and Meterpreter Pivoting Techniques: https://highon.coffee/blog/ssh-meterpreter-pivoting-techniques/
- Aggressor Scripts: https://github.com/bluscreenofjeff/AggressorScripts
- HOWTO: Port Forwards through a SOCKS proxy: https://blog.cobaltstrike.com/2016/06/01/howto-port-forwards-through-a-socks-proxy/
- Kerberos Attacks: https://www.cyberark.com/blog/kerberos-attacks-what-you-need-to-know/