In this article, I will be covering some basic pivoting methods that can be used to access networks we would normally not have access to through compromised computers. To demonstrate these pivoting techniques, I will be using the TryHackMe Wreath Network, created by the user MuirlandOracle. …