Exploit (computer security): Difference between revisions

Content deleted Content added
Pivoting: "improve" the writing and get rid of the grammar-incorrect sentence.
Pivoting: off topic
Line 34:
 
==Pivoting==
{{Off topic|date=August 2024|Pivoting|Pivoting is a follow-on to an exploit}}
Pivoting is a technique employed by both hackers and [[penetration test]]ers to expand their access within a target network. By compromising a system, attackers can leverage it as a platform to target other systems that are typically shielded from direct external access by [[Firewall (computing)|firewalls]]. Internal networks often contain a broader range of accessible machines compared to those exposed to the internet. For example, an attacker might compromise a web server on a corporate network and then utilize it to target other systems within the same network. This approach is often referred to as a multi-layered attack. Pivoting is also known as ''island hopping''.