{"id":77636,"date":"2022-10-04T09:48:14","date_gmt":"2022-10-04T09:48:14","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=77636"},"modified":"2025-10-22T11:51:58","modified_gmt":"2025-10-22T11:51:58","slug":"pivoting-penetration-testing","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/","title":{"rendered":"Pivoting to Access Networks in Penetration Testing\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"77636\" class=\"elementor elementor-77636\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b09140b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b09140b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d26d6e\" data-id=\"0d26d6e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1da190 elementor-widget elementor-widget-text-editor\" data-id=\"d1da190\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/what-is-penetration-testing\/\" target=\"_blank\" rel=\"noopener\">Penetration testing<\/a> is the process of simulating a cyberattack against a computer system or network to identify and fix vulnerabilities. Pivoting in penetration testing is a technique in which the ethical hackers\u2014also known as white-hat hackers\u2014simulating the attack can move from one system to another.<\/p><p>Below, we\u2019ll go over everything you need to know about pivoting in penetration testing, including how it works, the different types of pivoting in penetration testing, and how to become a penetration tester.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1082c6f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1082c6f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-900f1c7\" data-id=\"900f1c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-09db44f elementor-widget elementor-widget-heading\" data-id=\"09db44f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Is Pivoting in Penetration Testing? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3ef24c elementor-widget elementor-widget-text-editor\" data-id=\"e3ef24c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>During a cyberattack, the attackers rarely gain entrance to the entire network at once. Instead, attackers often focus on gaining access to a network via a single weak point. This is typically done through techniques such as phishing, malware, or scanning for security holes. Once inside the network, the attackers attempt to conceal themselves while moving to other systems connected to this point of entry.<\/p><p>In penetration testing, pivoting is the act of using a compromised system to spread between different computer systems once inside the network, simulating the behavior of a real attacker. This compromised machine is sometimes referred to as the \u201cinstance,\u201d \u201cplant,\u201d or \u201cfoothold.\u201d<\/p><p>After obtaining a foothold, penetration testers scan the network for other subnets and machines, looking for the most valuable (and vulnerable) points of attack. For example, an administrator machine may grant the attacker additional privileges and unlock new possible operations. Gaining access to these connected systems is easier from the inside because penetration testers can use the compromised machine\u2019s credentials and try to disguise their behavior as legitimate network traffic.\u202f<\/p><p>Pivoting is closely related to the concept of lateral movement in cybersecurity, and the terms are often used interchangeably. However, \u201cpivoting\u201d is most accurately used to refer to the act of moving from host to host, while \u201clateral movement\u201d also includes the act of privilege escalation (gaining access to other users and accounts) on the same machine.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ffd7c64 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ffd7c64\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6606f49\" data-id=\"6606f49\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7e7607 elementor-widget elementor-widget-heading\" data-id=\"a7e7607\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Are the Different Types of Pivoting in Penetration Testing? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd5eae7 elementor-widget elementor-widget-text-editor\" data-id=\"fd5eae7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are multiple ways for penetration testers to perform pivoting. Below are a few of the most common types of pivoting in penetration testing:<\/p><p><strong>Port forwarding:<\/strong> The attacker creates a tunnel between two machines via open TCP\/IP ports, forwarding packages and traffic from one to another. There are multiple forms of port forwarding:<\/p><ul><li><strong>Local port forwarding:<\/strong> The compromised machine \u201clistens\u201d for data and instructions from the attacker\u2019s machine, allowing the attacker to access internal services.<\/li><li><strong>Remote port forwarding:<\/strong> The attacker maps ports on their machine to local ports on the compromised machine, allowing them to reach internal services through an SSH connection.<\/li><li><strong>Dynamic port forwarding:<\/strong> The attacker creates a SOCKS proxy server for tunneling traffic, with the compromised machine acting as a middleman between the attacker\u2019s machine and internal services.<\/li><\/ul><p><strong>VPN pivoting:<\/strong> The attacker starts a virtual private network (VPN) client on the compromised machine, accessing a remote VPN server. The attacker then sends data from the server to the client and can also access information (e.g., network traffic) from the compromised machine by sending data from the client to the server.<\/p><p><strong>Proxy pivoting\/SSH pivoting:<\/strong> The attacker establishes a local proxy server through SSH. Any connections to the designated port are then forwarded through the proxy to their final destination.<\/p><p><strong>Routing tables:<\/strong> The attacker changes the routing table of the compromised machine to add a new route. This route will require any traffic sent to the destination to tunnel through the defined gateway, allowing the attacker to capture this data.<\/p><p>Regardless of which types of pivoting are used in penetration testing, the ultimate goal is to remain undetected for as long as possible while performing reconnaissance and accessing valuable files and information.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a2d7a71 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a2d7a71\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f7b6090\" data-id=\"f7b6090\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2976b2 elementor-widget elementor-widget-heading\" data-id=\"c2976b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Do Penetration Testers Pivot? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99cca75 elementor-widget elementor-widget-text-editor\" data-id=\"99cca75\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We\u2019ve talked about the various types of pivoting in penetration testing at a conceptual level\u2014but how do penetration testers pivot on a technical level? Below are just a few tools and techniques for how penetration testers pivot in a real-world scenario.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7bb7116 elementor-widget elementor-widget-heading\" data-id=\"7bb7116\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Meterpreter <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f15a5b elementor-widget elementor-widget-text-editor\" data-id=\"6f15a5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Meterpreter is a payload available through the Metasploit penetration testing software that gives the attacker an interactive, invisible shell for running commands and controlling the compromised machine.<\/p><p>Using Meterpreter, penetration testers can use the routing table pivoting method discussed above via the autoroute command. For example, the command:<\/p><p>meterpreter&gt; run autoroute -p<\/p><p>prints the active routing table<\/p><p>The command:<\/p><p>meterpreter&gt; run autoroute -s 10.1.1.0 -n 255.255.255.0<\/p><p>adds a route to 10.10.10.1\/255.255.255.0.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0d840a elementor-widget elementor-widget-heading\" data-id=\"c0d840a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. proxychains <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b806eea elementor-widget elementor-widget-text-editor\" data-id=\"b806eea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>proxychains is a tool for Unix systems that allows users to route any TCP connection through HTTP or a SOCKS proxy. As discussed above, this can be used for proxy pivoting.<\/p><p>To start using proxychains, penetration testers can simply edit the proxychains.conf configuration file, which contains a list of the proxy servers used on the local machine. By specifying the desired host and port number, attackers can add a new local proxy server to conceal their activities. Attackers can even chain multiple proxies together, which makes the task of evading detection (and being traced once detected) even more difficult.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6301b51 elementor-widget elementor-widget-heading\" data-id=\"6301b51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. sshuttle <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3bff2e elementor-widget elementor-widget-text-editor\" data-id=\"d3bff2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The sshuttle tool describes itself as \u201cwhere transparent proxy meets VPN meets ssh.\u201d sshuttle takes a hybrid approach, combining elements of both VPNs and SSH port forwarding to create a tunnel for exchanging network packets.<\/p><p>Using sshuttle, penetration testers can establish a VPN connection between a local machine and any remote server with Python installed and that is available via SSH. For example, the command below redirects the network 192.168.30.0\/24 to the local machine at the address 192.168.10.5:<\/p><p>sshuttle -r localhost@192.168.10.5 192.168.30.0\/24<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a0102e elementor-widget elementor-widget-heading\" data-id=\"2a0102e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. pwncat <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd0b307 elementor-widget elementor-widget-text-editor\" data-id=\"dd0b307\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>pwncat is a platform for attackers to exploit a compromised system after gaining entry, including tools for evading firewalls and IDS\/IPS. The pwncat platform is based on the netcat Unix networking utility, which allows users to read and write information across a network connection.<\/p><p>pwncat includes features for both local and remote port forwarding. For example, the command below establishes local port forwarding by redirecting the remote port 3306 to the local port 5050:<\/p><p>pwncat -L 0.0.0.0:5050 example.org 3306<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3c3f59f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3c3f59f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9bed439\" data-id=\"9bed439\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9acd447 elementor-widget elementor-widget-heading\" data-id=\"9acd447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Becoming a Penetration Tester With CPENT<sup>AI<\/sup> <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c59a118 elementor-widget elementor-widget-text-editor\" data-id=\"c59a118\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pivoting is an essential technique that all penetration testers should be familiar with. By successfully pivoting from one machine to the next, penetration testers can avoid or delay detection for as long as possible and extend the reach of their simulated attack.<\/p><p>If a career in penetration testing appeals to you, obtaining a penetration testing certification is an ideal way to get a foothold in the industry while honing your in-demand cybersecurity skills.EC-Council offers the<a href=\"https:\/\/test1.eccouncil.org\/train-certify\/certified-penetration-testing-professional-cpent\/\" target=\"_blank\" rel=\"noopener\"> Certified Penetration Testing Professional (CPENT<sup>AI<\/sup>)<\/a> program, which is the only program to teach you hands-on complete pentesting methodology. It will help you master AI-powered pentesting skills mapped to all pentesting phases and prepare you for VAPT compliance and various regulations. <a href=\"https:\/\/test1.eccouncil.org\/programs\/certified-penetration-testing-professional-cpent\/\">Click here<\/a> to learn more about the contents of the CPENT<sup>AI<\/sup> curriculum and start down the path of becoming a leading penetration testing expert.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-040d9e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"040d9e3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54b0620\" data-id=\"54b0620\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c3bf47 elementor-widget elementor-widget-heading\" data-id=\"6c3bf47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the Author  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7214489 elementor-widget elementor-widget-text-editor\" data-id=\"7214489\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>David Tidmarsh is a programmer and writer. He&#8217;s worked as a software developer at MIT, has a B.A. in history from Yale, and is currently a graduate student in computer science at UT Austin.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Penetration testing is the process of simulating a cyberattack against a computer system or network to identify and fix vulnerabilities. Pivoting in penetration testing is a technique in which the ethical hackers\u2014also known as white-hat hackers\u2014simulating the attack can move from one system to another. Below, we\u2019ll go over everything you need to know about&hellip;<\/p>\n","protected":false},"author":33,"featured_media":80983,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[11466],"tags":[],"class_list":{"0":"post-77636","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-penetration-testing"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity Pivoting in Penetration Testing: A Practical Guide to Accessing Networks Securely | EC-Council<\/title>\n<meta name=\"description\" content=\"By pivoting, penetration testers move from one compromised system to other systems. Read about what pivoting in penetration testing is, how it works, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pivoting to Access Networks in Penetration Testing\u00a0\" \/>\n<meta property=\"og:description\" content=\"By pivoting, penetration testers move from one compromised system to other systems. Read about what pivoting in penetration testing is, how it works, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-04T09:48:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T11:51:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/pivoting-penetration-testing-feature-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\"},\"headline\":\"Pivoting to Access Networks in Penetration Testing\u00a0\",\"datePublished\":\"2022-10-04T09:48:14+00:00\",\"dateModified\":\"2025-10-22T11:51:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/\"},\"wordCount\":1189,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/pivoting-penetration-testing-thumb-2.jpg\",\"articleSection\":[\"Penetration Testing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/\",\"name\":\"Cybersecurity Pivoting in Penetration Testing: A Practical Guide to Accessing Networks Securely | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/pivoting-penetration-testing-thumb-2.jpg\",\"datePublished\":\"2022-10-04T09:48:14+00:00\",\"dateModified\":\"2025-10-22T11:51:58+00:00\",\"description\":\"By pivoting, penetration testers move from one compromised system to other systems. Read about what pivoting in penetration testing is, how it works, and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/pivoting-penetration-testing-thumb-2.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/pivoting-penetration-testing-thumb-2.jpg\",\"width\":521,\"height\":521,\"caption\":\"Networks in Penetration Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/penetration-testing\\\/pivoting-penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Penetration Testing\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/penetration-testing\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Pivoting to Access Networks in Penetration Testing\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/10d534ff5660436a0efe90fea66ce5fd\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity Pivoting in Penetration Testing: A Practical Guide to Accessing Networks Securely | EC-Council","description":"By pivoting, penetration testers move from one compromised system to other systems. Read about what pivoting in penetration testing is, how it works, and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/","og_locale":"en_US","og_type":"article","og_title":"Pivoting to Access Networks in Penetration Testing\u00a0","og_description":"By pivoting, penetration testers move from one compromised system to other systems. Read about what pivoting in penetration testing is, how it works, and more.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2022-10-04T09:48:14+00:00","article_modified_time":"2025-10-22T11:51:58+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/pivoting-penetration-testing-feature-2.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd"},"headline":"Pivoting to Access Networks in Penetration Testing\u00a0","datePublished":"2022-10-04T09:48:14+00:00","dateModified":"2025-10-22T11:51:58+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/"},"wordCount":1189,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/pivoting-penetration-testing-thumb-2.jpg","articleSection":["Penetration Testing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/","name":"Cybersecurity Pivoting in Penetration Testing: A Practical Guide to Accessing Networks Securely | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/pivoting-penetration-testing-thumb-2.jpg","datePublished":"2022-10-04T09:48:14+00:00","dateModified":"2025-10-22T11:51:58+00:00","description":"By pivoting, penetration testers move from one compromised system to other systems. Read about what pivoting in penetration testing is, how it works, and more.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/pivoting-penetration-testing-thumb-2.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2022\/10\/pivoting-penetration-testing-thumb-2.jpg","width":521,"height":521,"caption":"Networks in Penetration Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/penetration-testing\/pivoting-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Penetration Testing","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/penetration-testing\/"},{"@type":"ListItem","position":4,"name":"Pivoting to Access Networks in Penetration Testing\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/10d534ff5660436a0efe90fea66ce5fd","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/77636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=77636"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/77636\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80983"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=77636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=77636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=77636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}