Course Overview

/

Identifying Pivot Point

What environments can attackers pivot through?

Pivoting can occur through a number of environments, endpoints and applications. There have been a number of examples where an attacker has infiltrated a network or an area of a networking using pivoting. For instance, a web application hosted on the internet may be attached and have access to an internal network. If the web application were to be comprised access to the internal network could be possible.

Pivot Environment

The lab environment NGS created for the purpose of the training was a dual NIC'd machine with access to two networks; created within in VMware.