Pivoting

Tunneling

SSH

Local Port Forward
ssh <gateway> -L <localport>:<remote host>:<remote port>

Remote Port Forward
ssh <gateway> -R <remote port>:<local host>:<local port>

SOCKs Proxy
ssh username@host -D <local proxy port> -p <remote port> <target ip>

sshuttle -vvr user@10.10.10.10 10.1.1.0/24

-nNT - do not allocate tty

proxychains - used to send any processes traffic through a SOCKs proxy defaults to port 9050

HTTPTunnel or stunnel - tunnel any traffic through HTTP or SSL