Pen testers and defenders both need to understand how attackers can move through an environment. From SSH tunnels to netsh.exe port proxies, there are many options for slithering from one host to another! Spend some time going through the SANS Pivot Cheat Sheet to see how to use each method and understand what they look like on the network.