Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Cybersecurity FOREVER

Day-367: What Is Pivoting?

12 Jul 2025

Description

Today I will discuss:1. What Is Pivoting?2. What Are the Different Types of Pivoting?Gateway ⛩ to become Skilled-Cybersecurity Professional 🕴🕴🕴 https://luminisindia.com/goehm---Pivoting refers to the distinctive practice of using an instance, which is also called a ‘foothold’ or plant to make it possible for you to move around within the compromised network. This process involves accessing networks that you would normally not have access to by exploiting compromised computers.Pivoting technique assumes the threat actor has compromised an inside host and wants to expand their access further into the compromised network. An example is a threat actor who has gained access to theadministrator password on a compromised host and is attempting to log in to another host using the same credentials.What Are the Different Types of Pivoting?Pivoting can be grouped into two types – proxy pivoting and VPN pivoting.Proxy PivotingVPN PivotingThis commonly explains the process of diverting traffic through a compromised target by applying a proxy payload on the machine and introducing attacks from the computer. This type of pivoting is limited to some TCP and UDP ports that are supported by the intermediary.This allows the attacker to generate an encoded layer to tunnel into the weakened machine to traverse any network traffic using that target machine to run a vulnerability assessment on the internal network through the undermined machine. This sufficiently gives the perpetrator complete network access, which appears as though they were behind the firewall.---_Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩  https://luminisindia.com/goehm How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯https://www.youtube.com/watch?v=84gNIEmCEAA If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.Thanks, Meena R.Your 'Cyber Warrior' Friend_YOU CAN FOLLOW ME AT: Facebook Page : https://www.facebook.com/cybersec.prism Instagram:  https://www.instagram.com/meena.cyber.warrior/Linkedin Profile: https://www.linkedin.com/in/meena1/About ME: https://www.youtube.com/watch?v=T66K3K5Y2tIYouTube Channel: https://www.youtube.com/@cybersecurityforever8214Hear My Podcast: https://anchor.fm/meena-rLinkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/**Here are more resources:**-Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)_https://luminisindia.com/cybersecurity-prism_You can also watch 👀 all the videos ofCybersecurity Series there:_Facebook Page : 👉👉👉  Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/YouTube : https://www.youtube.com/@cybersecurityforever8214_Gateway ⛩ to Cybersecurity--https://luminisindia.com/goehm_The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster..._✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh_Are you willing to learn Networking now?Would you like to watch some videos of Networking, CCNARouting & Switching, etc?_https://luminisindia.com/networking-free_❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓--https://luminisindia.com/free-ccna-security-presentations_

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.