0
0
Cybersecurityknowledge~6 mins

Post-exploitation and pivoting in Cybersecurity - Full Explanation

Choose your learning style9 modes available
Introduction
After gaining access to a system, attackers face the challenge of exploring deeper or moving sideways within a network. Post-exploitation and pivoting help attackers expand their control beyond the initial breach to reach valuable targets.
Explanation
Post-exploitation
Post-exploitation involves actions taken after an attacker gains access to a system. This includes gathering information, maintaining access, escalating privileges, and preparing for further attacks. The goal is to understand the environment and secure a stronger foothold.
Post-exploitation is about exploring and strengthening control inside a compromised system.
Pivoting
Pivoting is the technique attackers use to move from one compromised system to others within the same network. By using the first system as a stepping stone, they can access machines that were initially unreachable. This helps attackers reach sensitive data or critical infrastructure.
Pivoting allows attackers to reach deeper parts of a network by using compromised systems as gateways.
Types of Pivoting
There are two main types of pivoting: proxy pivoting and VPN pivoting. Proxy pivoting routes traffic through the compromised host to access other systems, while VPN pivoting creates a virtual private network tunnel to the target network. Both methods help attackers hide their movements.
Different pivoting methods help attackers move stealthily within a network.
Maintaining Access
During post-exploitation, attackers often install backdoors or create user accounts to keep access even if the initial vulnerability is fixed. This ensures they can return later to continue their activities or launch new attacks.
Maintaining access ensures attackers can return to the network after initial entry.
Real World Analogy

Imagine a thief breaking into a house through an unlocked window. After entering, they explore the rooms to find keys to other doors inside the house. Using these keys, they move from room to room, accessing more valuable items while avoiding detection.

Post-exploitation → The thief exploring the house and finding keys inside.
Pivoting → Using the keys to move from one room to another inside the house.
Types of Pivoting → Different ways the thief uses keys or secret passages to move quietly.
Maintaining Access → The thief hiding a spare key to return later without breaking in again.
Diagram
Diagram
┌───────────────┐       ┌───────────────┐       ┌───────────────┐
│ Initial Access│──────▶│ Compromised   │──────▶│ Target System │
│ Point         │       │ System (Pivot)│       │               │
└───────────────┘       └───────────────┘       └───────────────┘
        │                      │                      ▲
        │                      │                      │
        ▼                      ▼                      │
  Post-exploitation      Pivoting Techniques          │
  (Information          (Proxy or VPN pivoting)       │
   gathering,                                         │
   privilege escalation)                              │
                                                      │
                                                      └─────────────▶
This diagram shows how an attacker moves from initial access through post-exploitation to pivoting and finally reaches the target system.
Key Facts
Post-exploitationActions taken after initial access to explore and control a compromised system.
PivotingUsing a compromised system to access other systems within the same network.
Proxy PivotingRouting network traffic through a compromised host to reach other systems.
VPN PivotingCreating a virtual private network tunnel through a compromised host to access the target network.
Maintaining AccessTechniques used to keep control of a system after initial compromise, like backdoors.
Common Confusions
Believing pivoting means physically moving to another location.
Believing pivoting means physically moving to another location. Pivoting refers to moving within a network digitally, not physically moving between places.
Thinking post-exploitation is only about stealing data.
Thinking post-exploitation is only about stealing data. Post-exploitation also includes actions like privilege escalation, reconnaissance, and setting up backdoors.
Summary
Post-exploitation involves exploring and strengthening control inside a compromised system after initial access.
Pivoting lets attackers use one compromised system to reach others within the same network.
Maintaining access ensures attackers can return even if the initial vulnerability is fixed.