IntroductionSniffing Traffic within a SystemSniffing Traffic without Relocating a ServiceRogue Tunnel AttacksConnecting Through a Pivot SystemTransferring FilesUsing RedirectionMan-in-the-middle AttacksBackdoors and Shell ShovelingShell ShovelingShoveling with Direct Connection to TargetNetcat on WindowsSummary