USD ($)
$
United States Dollar
Euro Member Countries
India Rupee
د.إ
United Arab Emirates dirham
ر.س
Saudi Arabia Riyal

Pivoting in Multi-Layered Networks

Lesson 15/44 | Study Time: 20 Min

Pivoting is a fundamental technique used by attackers and penetration testers to extend their reach within multi-layered networks after compromising an initial host.

Multi-layered networks consist of segmented zones controlled by firewalls, VLANs, or other security mechanisms designed to restrict lateral movement.

It allows an attacker to use the compromised system as a stepping stone or proxy to access and control additional devices or systems in otherwise restricted parts of the network. 

Understanding the Concept of Pivoting

Pivoting involves leveraging control over one system to route traffic, commands, or exploits to other systems in different network segments not directly accessible from the attacker’s original location.

This process is crucial for gaining deeper access beyond initial footholds, enabling attacks on critical infrastructure, data centers, or segmented zones.

Types of Pivoting

Below are the primary pivoting techniques attackers and testers use to move deeper into restricted network environments. Each method enables traffic redirection through compromised hosts in different ways.


Multi-Layered Networks and Segmentation

Multi-layered networks enforce multiple security boundaries such as external firewalls, internal segmentation firewalls, VLANs, and subnet isolation.


1. They are designed to limit lateral movement by restricting direct access between segments.

2. Common segmentation examples include separating user workstations, servers, and sensitive data stores.

3. Effective segmentation reduces the blast radius of compromises by containing attackers within specific zones.

Pivoting Techniques in Multi-Layered Networks

Here are some commonly used pivoting techniques for operating within multi‑layered enterprise networks. These approaches allow attackers and testers to traverse restricted segments effectively.


1. Local Proxy Pivoting: Tools like ProxyChains, Metasploit’s SOCKS proxy, or Chisel tunnels enable attackers to direct traffic through compromised hosts, creating a local proxy environment to scan and connect within restricted network segments.

2. Remote Port Forwarding: Establishing remote tunnels to forward traffic from an external port to a target internal host port behind firewalls, effectively bypassing access controls.

3. VPN Pivoting: Setting up VPN connections from compromised hosts which provide broader network access as if the attacker was physically inside the network.

4. SSH Pivoting: Using SSH’s local, remote, or dynamic port forwarding to route traffic securely through compromised systems.

5. Double Pivoting and Pivot Chains: Sequentially using multiple compromised hosts in different layers to chain pivots into deeply isolated network zones.

Detecting and Defending Against Pivoting

Outlined below are strategies to defend networks from pivoting attacks and suspicious internal movement. These practices combine access control, monitoring, and alerting mechanisms.


Jake Carter

Jake Carter

Product Designer
Profile

Class Sessions

1- Deep Passive Reconnaissance 2- Active Reconnaissance Techniques 3- Traffic Analysis & Packet Crafting Fundamentals 4- Identifying Attack Surface Expansion Paths 5- Advanced Network Mapping & Host Discovery 6- Bypassing Firewalls & IDS/IPS 7- Man-in-the-Middle Attacks (ARP Spoofing, DNS Manipulation) 8- VLAN Hopping, Port Security Weaknesses, and Network Segmentation Testing 9- Windows & Linux Privilege Escalation: Advanced Enumeration & Kernel-Level Attack Paths 10- Exploiting Misconfigurations & File/Service Permission Abuse 11- Bypassing UAC, sudo, and Restricted Shells 12- Credential Dumping & Token/Key Abuse 13- Persistence Techniques (Registry, Scheduled Tasks, SSH Keys) 14- Tunneling & Port Forwarding (SOCKS Proxy, SSH Tunnels, Chisel Basics) 15- Pivoting in Multi-Layered Networks 16- Data Exfiltration Concepts & OPSEC Considerations 17- Server-Side Attacks (Advanced SQL Injection, Template Injection, Server-Side Template Injection - SSTI) 18- Authentication & Authorization Attacks (JWT Abuse, Session Misconfigurations) 19- SSRF, XXE, Deserialization & Logic Flaw Identification 20- Advanced API Security Testing (Token Handling, Rate-Limiting Bypass Concepts) 21- Wi-Fi Security Attacks (WPA3 Considerations, Enterprise Networks) 22- Rogue APs & Evil Twin Concepts 23- Mobile App Security Overview (Android & iOS Attack Surface, Static/Dynamic Testing) 24- IoT Device Weaknesses (Firmware Analysis Basics, Insecure Protocols, Hardcoded Credentials) 25- Cloud Service Models & Shared Responsibility (AWS, Azure, GCP basics) 26- Cloud Misconfigurations (IAM, Storage Buckets, Exposed Services) 27- Container & Kubernetes Security (Namespaces, Privilege Escalations, Misconfigurations) 28- Virtualization Weaknesses & Hypervisor Attack Concepts 29- Malware Behavior Analysis (Dynamic vs Static) 30- Exploit Development Concepts (Buffer Overflow Fundamentals, Shellcode Basics) 31- Reverse Engineering Essentials (Strings, Disassembly, Logic Flow Understanding) 32- Detection & Evasion Techniques (Sandbox Evasion Concepts) 33- Automating Recon & Scans (Python/Bash/PowerShell Basics) 34- Writing Custom Enumeration Scripts 35- Tool Customization (Modifying Payloads, Extending Existing Tools Ethically) 36- Data Parsing, Reporting & Workflow Automation 37- Threat Intelligence Integration & TTP Mapping 38- Attack Path Mapping (MITRE ATT&CK Alignment) 39- Social Engineering Campaign Planning (Ethical Boundaries & Simulations) 40- Blue Team Evasion Concepts (OPSEC, Log Evasion Principles) 41- Structuring Professional Penetration Test Reports 42- Mapping Findings to Risk Ratings (CVSS, Impact Assessment) 43- Presenting Findings to Executives and Technical Teams 44- Prioritizing Remediation and Security Hardening Guidance