{"id":795,"date":"2013-08-01T00:00:00","date_gmt":"1999-01-01T00:00:00","guid":{"rendered":"https:\/\/fir3netwp.gmsrrpobkbd.com\/?p=795"},"modified":"2023-02-04T01:50:16","modified_gmt":"2023-02-04T01:50:16","slug":"vpn-pivoting-explained","status":"publish","type":"post","link":"https:\/\/www.fir3net.com\/security\/concepts-and-terminology-security\/vpn-pivoting-explained.html","title":{"rendered":"VPN Pivoting Explained"},"content":{"rendered":"

By: Ayman Hammoudeh<\/p>\n

\n

Table of Contents<\/p>\n