The shades of tunneling
Solution of common pivoting problems during a Penetration Test
INTRODUCTION
During penetration testing, you may encounter the scenario when you want to be able to pivot through one of the compromised hosts to gain access to other systems in the internal network and continue testing.
In this article, you will be guided through 3 scenarios of…