Lesson 21
Discover the concept of network pivoting — how a compromised machine can serve as a jump point to access internal network segments that are unreachable from the outside, and how to document this attack surface.
Locked lesson
This lesson is reserved for members. Upgrade to unlock the full course.
200+ lessons • Challenges • Flashcards • $9/month
22 lessons locked in this course · 800+ students enrolled
$99/year — save 31% vs monthly