Skip to main content

One of the many tools and techniques used in cybersecurity to determine a system or network vulnerability is penetration testing. 

When performing the test or other security assessment, it usually starts from an external network, accompanied by penetration testing, research, and accessible global network services. 

These are efforts done to detect, identify, and capture vulnerabilities or loopholes in your local network.

If you are searching for a promising career in the field of Information Technology, Cybersecurity would be the perfect job for you. Learn cybersecurity with us at RCyberSolutions. We offer the best quality services, courses, and certifications. 

The traffic on your local network is non-routable. Other systems that are linked directly to your network can enable access to the local network, and at the same time, remain inaccessible to external or an attacker. 

This topic lets us learn and define how penetration testers can access hidden networks through double pivoting. Here are the four steps to double-pivot during penetration testing.

Pivoting

Pivoting is a distinctive process of using an instance called ‘foothold’ that allows you to move around within a compromised network. It involves network access that you usually don’t have to access when exploiting compromised computers. 

When exploiting the initial compromise, it enables you to compromise with other inaccessible systems directly. So pivoting makes non-routable traffic routable. 

Using the pivot method, the attacker can work on the environment and use its tools as if it were operating inside the organization’s network. 

This makes cybersecurity difficult since an unsecured computer network can provide an entry point to pivot to its destination.

Types of Pivoting

There are two types of known pivoting. These are proxy pivoting or the use of VPN pivoting. 

Proxy pivoting explains the process of diversion in traffic in a compromised target by implicating proxy payload in a machine and attacks from the computer. 

However, the method is limited to some UDP and TCP that are supported by intermediaries. 

VPN pivoting allows the attacker to create an encrypted layer to tunnel through a weakened machine and intercept network traffic to run a vulnerability assessment. This will enable the attacker to complete access to the network as if they are behind a firewall.

4 Steps to do a Double Pivot

Pivot through ProxyChains and SSH

This gives an advantage to SSH with dynamic port forwarding while creating a socks proxy. With this and ProxyChains, it can aid tools that can not be implemented in a sock proxy. 

Pivot through Socks Proxy and Meterpreter

Other directions don’t use SSH, but they help Meterpreter as a proxy sock. However, some proxies are limited to support specific forms of traffic and TCP protocols. 

A complete Nmap or similar tools may not be able to support such a method. 

Pivot on Netcat Relay or Ncat

The application for Netcat or Ncat is by installing it on your own, on the target network. With this, it can serve as a tunnel. 

This software is not typically found in existing network securities.

Using Tools on Target Machines

Install different command line tools on your target system or visual desktop servers. This includes VNC. You can then apply the pivot box as a new attacker system. 

By installing tools in this device, it can optimize the standard of engagement in penetration testing.

Career Opportunity

Certified professionals do these work and tests in cybersecurity. Be a part of IT’s most advanced industry by enrolling with us at Reliable Cyber Solutions, LLC.

We offer different expert courses and certifications that you can learn through our online platform. Check our website now at RCyberSolutions.

error: Content is protected !!
AVOID DARK WEB THREATS
Enter your name and email below and I’ll send you a checklist on how to secure your business systems from the dark web – and notify you when new training and resources are available.