Update 'Post Exploitation/Pivoting.md'
This commit is contained in:
parent
165af4c179
commit
5566ae0be4
|
@ -1,7 +1,6 @@
|
|||
# Pivoting
|
||||
|
||||
* Tunnelling/Proxying
|
||||
* Port Forwarding
|
||||
In the realm of penetration testing, "pivoting" refers to the technique of using a compromised system or foothold within a target network to launch further attacks or gain deeper access into the network as a proxy for the attacker. It involves moving laterally within the network infrastructure by leveraging the compromised system as a stepping stone to reach more sensitive or valuable assets. Pivoting allows a penetration tester (or an attacker) to explore and exploit additional vulnerabilities and systems that may not be directly accessible from their initial point of entry.
|
||||
|
||||
## Enumeration
|
||||
|
||||
|
|
Loading…
Reference in New Issue