← Back to Glossary
Network Pivoting
A technique where an attacker uses a compromised system as a relay point to access other systems on the same network that are not directly accessible.
A technique where an attacker uses a compromised system as a relay point to access other systems on the same network that are not directly accessible.