In this video walkthrough, we demonstrated the concept of network pivoting. We compromised the main windows target and discovered another windows server to which we also gained access by exploiting the MySQL server.
Receive video documentation, QA and request special video training
Do you need private cybersecurity training? sign up here