Skip to content

When conducting a web application penetration test there are times when you want to be able to pivot through a system to which you have gained access, to other systems in order to continue testing. There are many channels that can be used as avenues for pivoting.

Notifications You must be signed in to change notification settings

identity-threat-labs/Pivoting-Attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

Pivoting-Attack

When conducting a web application penetration test there are times when you want to be able to pivot through a system to which you have gained access, to other systems in order to continue testing. Usually during a penetration test or security assessment, depending, of course, of the strategy used during this work that could be started with an external network often with research and pentesting of machines and services available from the global network, this phase of the discovery is called Reconnaissance, many times we can see, that attempts are being made to find a security hole and, if it succeeds, then a penetration into the local network is performed in order to capture as many systems as possible. Local network traffic is non-routable, that is, other computers that are physically connected to this network can access the resources of the local network, and the attacker cannot access them. So, Pivoting is a set of techniques that allow an attacker to gain access to local resources, in essence, making traffic routable that is normally non-routable, during a Penetration Test, this phase called Post Exploitation.

Pivoting helps an attacker to configure the working environment to use the tools in such a way as if he were in the organization’s local network, that is, using pivoting is achieved, you can get access to local resources and the ability to use tools to scan and search for vulnerabilities from your computer in a remote local network, as if they were installed right there, so, hacker tools gain access to the local network, which under normal conditions is impossible for non-routable traffic.

senhasegura-identity-threat-labs-logotype_horizontal-color

About

When conducting a web application penetration test there are times when you want to be able to pivot through a system to which you have gained access, to other systems in order to continue testing. There are many channels that can be used as avenues for pivoting.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published