This video (Spanish) corresponds to a talk offered during the last RootedCon in Madrid and published by the pentester.es blog. It  shows different techniques to perform pivoting through systems in a pentest.

José Selvi - Unprivil eged Network Post-Exploitation (Rooted CON 2011) from rootedcon on Vimeo.

I found particularly interesting the mention of the &nbs p;command line kung fu blog.

Props to Paul Asadooria n,  Ed Skoudis, Hal Pomeranz and Tim Medin :)

At the end of the video, there is a nice dem o that uses some shell fu to discover servers in the internal network and setup the forwards in Metasploit. Sweet!