114k views
1 vote
Moving laterally within a network once an initial exploit is used to gain persistent access for the purpose of establishing further control of a system is known as:

1 Answer

6 votes

Answer:

The right answer is Pivoting.

Step-by-step explanation:

Penetration testers use pivoting as a technique to attack other systems having gained a foothold in one process within the same network. This allows them to circumnavigate firewall configurations, which may constitute restrictions and prohibit direct access to all other machines.

Cheers!

User Shanikah
by
8.4k points