What is pivoting in a penetration test or real-world attack scenario?

Cybersecurity Fundamentals Hard

Cybersecurity Fundamentals — Hard

What is pivoting in a penetration test or real-world attack scenario?

Key points

  • Pivoting involves leveraging a compromised host as a stepping stone.
  • It helps attackers move laterally within a network.
  • Different from changing attack methodologies or rotating C2 servers.

Ready to go further?

Related questions