Pivoting Use compromised machines to access restricted networks. Techniques: SSH Tunneling Proxychains VPN or SOCKS proxies Tools: Chisel, Ligolo, SSH, Metasploit