Course Content
Intro to Cyber
📺 Livestream Timestamp: 3:25:00 — Post-Exploitation & Privilege Escalation

You’ve compromised one machine. But that machine is just a foothold. The real target is somewhere else on the network. That’s where pivoting comes in. You use your compromised host as a springboard to attack other machines.

Start with network discovery: ifconfig or ipconfig /all, arp -a, netstat -an, route or route print. These show available network segments.


Part of the free Intro to Cyber course by Cover6 Solutions.

Scroll to Top