← Back to Glossary
Pivoting
A technique where an attacker uses a compromised system as a stepping stone to reach other systems on the internal network that are not directly accessible.
A technique where an attacker uses a compromised system as a stepping stone to reach other systems on the internal network that are not directly accessible.