# Introduction
- We may need to use a `pivot host` that we have already compromised to find a way to our next target
- When we land on a host for the first time, we should check our `privilege level`, `network connections`, and potential `VPN or other remote access software`
- Different terms used to describe a host that we use to pivot to a previously unreachable network segment:
- pivot host
- proxy
- foothold
- beach-head system
- jump host
# Terms Compared
- Lateral movement
- A technique used to further our access to additional `hosts`, `applications`, and `services` within a network environment
- Pivoting
- Utilizing multiple hosts to cross `network` boundaries you would not usually have access to
- Tunneling
- Usage of various protocols to shuttle traffic in/out of a network where there is a chance of our traffic being detected such as HTTPS over TLS or SSH
# Networking Commands
- Linux
- `ifconfig` shows all network interfaces
- `arp` shows arp table
- `nestat -r` shows routing table
- `ip a` shows all network interfaces
- `ip route list` shows routing table
- `ip neigh` shows arp table
- Windows
- `ipconfig` shows all network interfaces