Port Tunneling Explained I keep notes on how port tunneling works, and specify which scenario to deploy which technique. SSH Port Tunneling for exploitation Metasploit Port Tunneling for exploitation