PIVOTING
This technique uses a compromised system as a bridge to reach other systems or networks that are otherwise inaccessible from the original point of entry. With this, external traffic is routed through systems, which effectively facilitates movement into more protected or segmented areas of the target environment. This is essential when direct access to internal resources is blocked by network segmentation or firewall rules. Think of pivoting as setting up your own "router" inside the target environment.
Last updated