Pivoting is a post-exploitation technique used to route traffic through a
compromised machine in order to reach other systems on a network that are
not directly accessible.
It allows attackers to move laterally, discover internal hosts, and exploit
additional targets by using the first compromised host as a gateway
Machines used:
Kali Linux(Attacker machine): used to run exploits, scans, and control sessions
Windows XP(Pivot machine): used as a gateway to access internal network
⟶ (192.168.29.133 ,192.168.100.129)
Windows 7(Target machine): in the internal network exploited after pivoting
⟶ (192.168.100.128)