Pivoting Technique
Pivoting is a technique used by attackers to move deeper within a network after initial access. It is typically executed during the Post-Exploitation phase and involves using a compromised device as a launching pad to access other parts of the network that are not directly accessible from the attacker's original position. Pivoting is often employed to bypass network segmentation or internal firewalls.