In this video walkthrough, we demonstrated the concept of network pivoting. We compromised the main windows target and discovered another windows server to which we also gained access by exploiting the MySQL server.



Receive video documentation, QA and request special video training


Do you need private cybersecurity training? sign up here

CyberSecurity Consultation

About the Author

Cybersecurity Trainer MS in Cybersecurity Expertise in Healthcare and Finance Industries Penetration tester and compliance auditor

View Articles