The term pivoting refers to the action of using an vulnerable instance, also known by ‘foothold’, to move from place to place inside the compromised network. In a corporate environment, most of the machines are behind a firewall, which makes it impossible to attack them directly. However, if there is a vulnerable machine exposed to the internet which is also connected to an internal network, it might be possible to pivot through it and attack the machines on this internal network.