☑️Introduction

Pivoting is essentially the idea of moving to other networks through a compromised host to find more targets on different network segments. There are many terms to describe the compromised host such as: Pivot Host, Proxy, Foothold, Beach Head system, Jump Host.

After we compromise a system we should check our privileges, network interfaces, and if there is any VPN connection with that system.

We can check for network interfaces with commands like ifconfig and ipconfig.

We can also check the routing table with netstat -r or ip route.

If we find a public IP address that it might be in a public facing network such as a DMZ.

Last updated