Readers of ZSEC and my Twitter feed,
A quick message/explanation. I have published my last two blog posts for a while
as I am working on my second book;
LTR102 [https://leanpub.
One thing that comes up a lot when it comes to red teaming, penetration testing and breaching a network is being able to proxy traffic into multiple environments.