【漏洞赏金渗透课程】什么是端口转发 | 隧道 | 内网渗透技巧
作者:FancyPig | 发布时间: | 更新时间:
相关阅读
data-postsbox="{"id":31474,"title":"漏洞赏金中最简单、最普遍的漏洞 | IDOR | 不安全的直接对象引用","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2023/01/20230129102938948.png","cover_video":"https://v.pigsec.cn/The%20MOST%20common%20and%20EASY%20bug%20%20in%20Bug%20Bounty_ts.m3u8","views":2210,"comment_count":4,"category":"knowledge","is_forum_post":false}">{"id":31474,"title":"漏洞赏金中最简单、最普遍的漏洞 | IDOR | 不安全的直接对象引用","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2023/01/20230129102938948.png","cover_video":"https://v.pigsec.cn/The%20MOST%20common%20and%20EASY%20bug%20%20in%20Bug%20Bounty_ts.m3u8","views":2210,"comment_count":4,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":30581,"title":"【漏洞赏金渗透课程】如何绕过访问禁止、重定向的页面","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2023/01/20230116085819119.png","cover_video":"https://v.pigsec.cn/Filters%20Bypass%20Web%20App%20directory_file%20-%20Bug%20Bounty%20-%20Ethical%20Hacking_ts.m3u8","views":2429,"comment_count":7,"category":"knowledge","is_forum_post":false}">{"id":30581,"title":"【漏洞赏金渗透课程】如何绕过访问禁止、重定向的页面","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2023/01/20230116085819119.png","cover_video":"https://v.pigsec.cn/Filters%20Bypass%20Web%20App%20directory_file%20-%20Bug%20Bounty%20-%20Ethical%20Hacking_ts.m3u8","views":2429,"comment_count":7,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":25390,"title":"【漏洞赏金渗透课程】如何快速找到文件上传支持的扩展名?","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/10/20221025021832613.png","cover_video":"","views":2621,"comment_count":4,"category":"knowledge","is_forum_post":false}">{"id":25390,"title":"【漏洞赏金渗透课程】如何快速找到文件上传支持的扩展名?","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/10/20221025021832613.png","cover_video":"","views":2621,"comment_count":4,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":25119,"title":"【漏洞赏金渗透课程】Api接口渗透测试、Fuzz技巧分享","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/10/20221022045345855.png","cover_video":"","views":4194,"comment_count":6,"category":"knowledge","is_forum_post":false}">{"id":25119,"title":"【漏洞赏金渗透课程】Api接口渗透测试、Fuzz技巧分享","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/10/20221022045345855.png","cover_video":"","views":4194,"comment_count":6,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":22253,"title":"【漏洞赏金侦察课程】如何发现隐藏的子域名\u0026URL","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3134,"comment_count":5,"category":"knowledge","is_forum_post":false}">{"id":22253,"title":"【漏洞赏金侦察课程】如何发现隐藏的子域名\u0026URL","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3134,"comment_count":5,"category":"knowledge","is_forum_post":false}
视频讲解
本期视频中,我们将分享一个在网络安全领域中一个重要的概念,那就是端口转发。端口转发,允许攻击者将一个端口的流量从一个计算机转发到另一个计算机,从而使得攻击者可以通过中间计算机来绕过防火墙和其他安全限制。例如,如果攻击者成功获取了一台内网中的计算机的访问权限,但是该计算机无法直接连接到其他计算机,那么攻击者可以使用端口转发将流量从该计算机转发到其他计算机,从而实现横向移动。因此,我们今天将为大家带来一个实验,帮助大家更好理解端口转发的概念以及实现的思路。