← Back to Glossary

Pivoting

A technique where an attacker uses a compromised system as a stepping stone to reach other systems on the internal network that are not directly accessible.

Learn More

📚 Penetration Testing Hub

Related Terms