# Introduction -  We may need to use a `pivot host` that we have already compromised to find a way to our next target - When we land on a host for the first time, we should check our `privilege level`, `network connections`, and potential `VPN or other remote access software` - Different terms used to describe a host that we use to pivot to a previously unreachable network segment: - pivot host - proxy - foothold - beach-head system - jump host # Terms Compared - Lateral movement - A technique used to further our access to additional `hosts`, `applications`, and `services` within a network environment - Pivoting - Utilizing multiple hosts to cross `network` boundaries you would not usually have access to - Tunneling - Usage of various protocols to shuttle traffic in/out of a network where there is a chance of our traffic being detected such as HTTPS over TLS or SSH # Networking Commands - Linux - `ifconfig` shows all network interfaces - `arp` shows arp table - `nestat -r` shows routing table - `ip a` shows all network interfaces - `ip route list` shows routing table - `ip neigh` shows arp table - Windows - `ipconfig` shows all network interfaces