Against: Pentesting MikroTik Routers The use of MikroTik routers is widespread around the world and their security is an issue. This is a release of my article on attacks on MikroTik routers.
Witchhammer VIP: NAT bypass for pivoting on Windows NAT can cause problems for a pentester when pivoting, especially if we are talking about compromised Windows machines. In this article, I will continue to demonstrate the concept of L2 tunneling against compromised Windows machines, but with NAT in mind