menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Technology News

>

Pivoting f...
source image

Medium

1w

read

75

img
dot

Pivoting for Hackers: Expanding Your Foothold in a Network

  • Pivoting allows hackers to use a compromised system as a stepping stone to access other systems inside a network.
  • Pivoting can be done in two main ways: Proxy-based Pivoting and VPN-based Pivoting.
  • Practical pivoting techniques include using tools like Metasploit, SSH tunnels, Chisel, and Ligolo-NG.
  • Defensive measures against pivoting include network segmentation, host-based firewalls, log monitoring, and multi-factor authentication (MFA).

Read Full Article

like

4 Likes

For uninterrupted reading, download the app