Cybersecurity Fundamentals — Hard
Key points
- Pivoting involves leveraging a compromised host as a stepping stone.
- It helps attackers move laterally within a network.
- Different from changing attack methodologies or rotating C2 servers.
Ready to go further?
Related questions
