Pivoting
Last updated
Was this helpful?
Last updated
Was this helpful?
You compromise a machine and see that it has another interface on it that's connected to a different network.
We can use the compromised machine as a pivot point into the newly discovered network
Two methods (stated from THM Wreath)
Tunnelling/Proxying: Creating a proxy type connection through a compromised machine in order to route all desired traffic into the targeted network. This could potentially also be tunneled inside another protocol (e.g. SSH tunneling), which can be useful for evading a basic Intrusion Detection System (IDS) or firewall
Port Forwarding: Creating a connection between a local port and a single port on a target, via a compromised host
A Linux webserver is ideal for pivoting