← Back to Glossary

Network Pivoting

A technique where an attacker uses a compromised system as a relay point to access other systems on the same network that are not directly accessible.

Learn More

📚 Network Scanning Course

Related Terms