diff --git a/Post Exploitation/Pivoting.md b/Post Exploitation/Pivoting.md index 9c88016..4c5cb92 100644 --- a/Post Exploitation/Pivoting.md +++ b/Post Exploitation/Pivoting.md @@ -1,7 +1,6 @@ # Pivoting -* Tunnelling/Proxying -* Port Forwarding +In the realm of penetration testing, "pivoting" refers to the technique of using a compromised system or foothold within a target network to launch further attacks or gain deeper access into the network as a proxy for the attacker. It involves moving laterally within the network infrastructure by leveraging the compromised system as a stepping stone to reach more sensitive or valuable assets. Pivoting allows a penetration tester (or an attacker) to explore and exploit additional vulnerabilities and systems that may not be directly accessible from their initial point of entry. ## Enumeration