Pivoting is one of the post-exploitation processes where an attacker tries to expand its presence in the network infrastructure. In this article, I will demonstrate a method of pivoting on Linux using TailScale to get into the internal infrastructure
Caster - Defect VIP
https://blog.exploit.org/defectvip
Caster - Defect VIP
https://blog.exploit.org/defectvip