What Is Pivoting?

Pivoting is essentially the idea of moving to other networks through a compromised host to find more targets on different network segments

image.png

Pivoting Vs Lateral Movement Vs Tunneling

Lateral movement can be described as a technique used to further our access to additional hosts, applications, and services within a network environment

image.png

Utilizing multiple hosts to cross network boundaries you would not usually have access to. This is more of a targeted objective

image.png

In Tunneling We often find ourselves using various protocols to shuttle traffic in/out of a network where there is a chance of our traffic being detected. For example, using HTTP to mask our Command & Control traffic from a server we own to the victim host.

image.png

Now let’s Identify The Network Adapters we have

ifconfig

image.png

Routing

pivot host route traffic to another network. One way we will see this is through the use of AutoRoute, which allows our attack box to have routes to target networks that are reachable through a pivot host.

Now let’s identify the routes