The method we use to pivot will depend on the OS of the target systems. Metasploit can make pivoting easier which we will learn about in the future.
There are two main methods when it comes to pivoting:
- Tunneling/Proxying: creating a proxy connection thru a compromised machine in order to route all desired traffic into the targeted network. This could also be tunneled inside another protocol (SSH tunneling) which can be useful for evading IDS or firewalls
- Port forwarding: Creating a connection between a local port and a single port on the target.