Discover the concept of network pivoting — how a compromised machine can serve as a jump point to access internal network segments that are unreachable from the outside, and how to document this attack surface.
Locked lesson
This lesson is reserved for members. Upgrade to unlock the full course.