Update 'Post Exploitation/Pivoting.md'

This commit is contained in:
Stefan Friese 2023-09-05 14:14:28 +02:00
parent 165af4c179
commit 5566ae0be4
1 changed files with 1 additions and 2 deletions

View File

@ -1,7 +1,6 @@
# Pivoting
* Tunnelling/Proxying
* Port Forwarding
In the realm of penetration testing, "pivoting" refers to the technique of using a compromised system or foothold within a target network to launch further attacks or gain deeper access into the network as a proxy for the attacker. It involves moving laterally within the network infrastructure by leveraging the compromised system as a stepping stone to reach more sensitive or valuable assets. Pivoting allows a penetration tester (or an attacker) to explore and exploit additional vulnerabilities and systems that may not be directly accessible from their initial point of entry.
## Enumeration