As a pentester, you might be able to take control of systems that have a direct access but you also might be able to test the internal network and check the machine who are inside a subnetwork.
For that task you’ll have to use an already compromised machine as a bridge/gateway, this technic is called “pivot”. Depending of the context, different solutions exist to perform that task.
The easiest one. First you need to install Rinetd:
aptitude search rinetd p rinetd - Internet TCP redirection server</pre>
Then edit the
# bindadress bindport connectaddress connectport 192.168.0.10 80 126.96.36.199 8080
Restart Rinetd and from now, all incoming traffic on
192.168.0.10 on port
80 will be redirected to
188.8.131.52 on port
This can be usefull if a firewall is restricting outbound traffic on certain port.