From 5566ae0be49f172a1b6b369d575c50cea0e88518 Mon Sep 17 00:00:00 2001 From: whx Date: Tue, 5 Sep 2023 14:14:28 +0200 Subject: [PATCH] Update 'Post Exploitation/Pivoting.md' --- Post Exploitation/Pivoting.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/Post Exploitation/Pivoting.md b/Post Exploitation/Pivoting.md index 9c88016..4c5cb92 100644 --- a/Post Exploitation/Pivoting.md +++ b/Post Exploitation/Pivoting.md @@ -1,7 +1,6 @@ # Pivoting -* Tunnelling/Proxying -* Port Forwarding +In the realm of penetration testing, "pivoting" refers to the technique of using a compromised system or foothold within a target network to launch further attacks or gain deeper access into the network as a proxy for the attacker. It involves moving laterally within the network infrastructure by leveraging the compromised system as a stepping stone to reach more sensitive or valuable assets. Pivoting allows a penetration tester (or an attacker) to explore and exploit additional vulnerabilities and systems that may not be directly accessible from their initial point of entry. ## Enumeration