Pivoting
Introduction to Network Pivoting
Network pivoting refers to the technique of using an initial foothold on a compromised system to move through a network and access other internal systems or resources. This method is commonly used in penetration testing and red teaming to escalate privileges and maintain persistence within a target network.
Tools like Ligolo-ng and ProxyChains are often used for this purpose, enabling attackers to route their traffic through a compromised system (or "pivot point") and access internal networks that are not directly reachable from the outside world.
How Network Pivoting Works
When an attacker compromises a system within a network, they can use it as a pivot point to route traffic to other systems inside the network. This is useful when dealing with firewalls or network segmentation that prevent direct access to internal systems from the outside. By using the pivoting technique, attackers can:
Tunnel traffic through the compromised machine to access services that would otherwise be restricted.
Bypass firewalls and network segmentation by routing traffic through an internal system that bridges the gap.
Access hidden or restricted network segments without directly compromising each system.
Last updated