πͺPlink Windows Pivoting
π Module Overview
1. Introduction to Plink.exe
What is Plink?
Why Use Plink?
Common Scenarios
2. Plink vs SSH Comparison
3. Basic Plink Dynamic Port Forwarding
Network Topology
Command Syntax
Expected Output
Verification
4. Proxifier Integration
What is Proxifier?
Proxifier Configuration Steps
Step 1: Add SOCKS Server
Step 2: Create Proxification Rules
Step 3: Enable Proxification
5. RDP Through Plink SOCKS Tunnel
Complete Workflow
Step 1: Start Plink SOCKS Tunnel
Step 2: Configure Proxifier
Step 3: Launch RDP Session
Traffic Flow Analysis
6. Advanced Plink Techniques
Authentication Methods
Password Authentication
Key-based Authentication
Multiple Port Forwards
Background Process
7. Windows Application Integration
Applications That Work with SOCKS Proxies
Native SOCKS Support
Proxifier-Required Applications
Browser Configuration Example
8. Operational Security with Plink
Stealth Considerations
Detection Risks
Mitigation Strategies
9. Troubleshooting Plink Issues
Common Problems and Solutions
Authentication Failures
Connection Refused
SOCKS Proxy Not Working
Proxifier Issues
10. Alternative Windows SSH Tools
Built-in Windows SSH (Windows 10+)
Other Windows SSH Clients
11. Lab Exercise Recreation
HTB Academy Optional Exercise
Complete Solution Steps
Step 1: Environment Setup
Step 2: Establish Plink Tunnel
Step 3: Configure Proxifier
Step 4: RDP Connection
Step 5: Submit Answer
12. Comparison with Linux SSH Methods
Functionality Comparison
Integration Differences
Linux Integration
Windows Integration
13. Real-World Scenarios
Scenario 1: Corporate Windows Environment
Scenario 2: Legacy System Compromise
Scenario 3: Windows Red Team Operation
14. Best Practices
Operational Guidelines
Security Recommendations
Performance Optimization
15. Integration with Other Tools
Metasploit Integration
PowerShell Integration
Nmap through Proxy
References
Last updated