In this chapter, we discussed the protocol tunneling tools that can wrap one network protocol to the other. The goal of this protocol tunneling is to bypass any mechanisms enacted by the target machine to limit our capabilities to connect to the outside world. The tools in this category are DNS2tcp, Ptunnel, and Stunnel4.
The next tools are proxies. They are used to separate the direct connection between one machine and the other machine. The tools in this category are 3proxy and proxychains.
End-to-end connections tools come next. Their purpose is to create a network connection between two machines so they can carry out a file transfer or run a command on the remote machine.
The main purpose of all of the tools in this chapter is that we ...