Pivoting 2 - SSH Local & Chisel

What flag is needed to use dynamic SSH connections?
-d
--Dynamic
-dyn
-D
-D
What is the correct structure to local SSH port forwarding?
ssh -L 3336:<remote host>:3306 <user>@<remote host>
ssh -L 3336:<local host>:3306 <user>@<remote host>
ssh -L <remote host>:3306:3336 <user>@<remote host>
ssh -L <local host>:3306:3336 <user>@<remote host>
ssh -L 3336:<remote host>:3306 <user>@<remote host>
When would you use dynamic SSH port forwarding within pentesting?
To discover what is on a newly identified network
To connect to a specific service
To jump between hosts
To block a connection to a specific service
To discover what is on a newly identified network
What attack type could allow access via SSH?
Brute Forcing
DDoS
SSL Downgrade Attack
DoS
Brute Forcing
Which flag instructs SSH to not send any commands and just open a connection?
-n
-O
-p
-F
-n
Which flag sets the SSH session immediately to background?
-F
-t
-b
-u
-F
Which of the following commands would allow for SSH key-based authentication?
-I
-t
-p
-l
-I
Which of the following commands would create a Window tunnel using SSH?
ssh -X <user>@<ip>
ssh -VV <user>@<ip>
ssh --Window <user>@<ip>
ssh -x <user>@<ip>
ssh -X <user>@<ip>
What kind of model does Chisel work from?
Client/server
Open/closed
True/false
On/Off
Client/server
What flag is needed to specify a reverse SOCKS proxy?
R:socks
Socks:r
Reverse:S
r:socks
R:socks
What is Chisel's encrypted tunnel secure by?
SSH
TLS
SSL
IPSec
SSH
What version of SOCKS does chisel use by default?
socks5
socks4a
socks4
http proxy
socks5
When using Chisel with Metasploit, what global setting needs to be changed?
Proxies
Routing
Authenticaiton
run
Proxies
What is the most stable shell type when using Chisel through a pivot?`
Bind
Reverse
Encrypted
Https
Bind
What proxy application must be used when using tools through Chisel?
Proxychains
Proxy
Proxychain
socat
Proxychains
Your Score
Score Label
Score Summary