You’ve compromised one machine. But that machine is just a foothold. The real target is somewhere else on the network. That’s where pivoting comes in. You use your compromised host as a springboard to attack other machines.
Start with network discovery: ifconfig or ipconfig /all, arp -a, netstat -an, route or route print. These show available network segments.
Part of the free Intro to Cyber course by Cover6 Solutions.