Skip to main content
Home / Hacking Glossary / Pivoting

Pivoting

Using a compromised system as a relay point to access other networks or systems that would otherwise be unreachable from the attacker's position.

pentest attack
Practice Challenges 3 categories
Active CTF Events 3
View all events →
Related Terms 12

Ready to learn Pivoting hands-on?

Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.

Get Started Free