Pivoting & Tunneling
Overview
Pivoting routes traffic through a compromised host to reach internal networks that are not directly accessible from the attacker. When initial access lands on a DMZ or perimeter host, pivoting extends reach into internal segments — database servers, domain controllers, and management networks. Tunneling tools encapsulate traffic through the compromised host, creating a bridge between the attacker and internal systems.
Topics in This Section
General Approach
- Map the network — identify subnets reachable from the compromised host but not from the attacker
- Choose tunneling method — SSH tunneling (if SSH available), Chisel/Ligolo-ng (binary transfer), or built-in tools
- Set up the tunnel — establish reverse connection from compromised host to attacker
- Configure proxychains — route tools through the SOCKS proxy to reach internal targets
- Enumerate internal network — scan and enumerate through the tunnel