Pivoting is the movement from a compromised host to other hosts on the network. This can often mean using a compromised computer as a jump host to connect to other otherwise inaccessible hosts.
Pivoting is the movement from a compromised host to other hosts on the network. This can often mean using a compromised computer as a jump host to connect to other otherwise inaccessible hosts.