Getting the Most out of the SANS Pivot Cheat Sheet 2022

Pen testers and defenders both need to understand how attackers can move through an environment. From SSH tunnels to netsh.exe port proxies, there are many options for slithering from one host to another! Join me to spend some time going through the SANS Pivot Cheat Sheet to see how to use each method and understand what they look like on the network.