The technique of moving through a network after initial compromise to access additional systems, escalate privileges, and reach high-value targets.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free