Pivoting is one of the stages of post-exploitation, in a sense it is extreme network administration. In my article I will demonstrate pivoting on Windows using TailScale
Caster - Defect
https://blog.exploit.org/defect
Caster - Defect
https://blog.exploit.org/defect