Using a compromised system as a relay point to access other networks or systems that would otherwise be unreachable from the attacker's position.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free