In a RedTeam activity, we may often find more networks which are further accessible from one of the internal systems. In our case, this was the 172.19.4.0/24 network. Multi-level pivoting occurs when we achieve further access into a different subnet. Let's look at an example of this:
![](https://static.packt-cdn.com/products/9781788995238/graphics/assets/6e108b96-f502-42e6-a7cb-40fffe193062.png)
In the preceding diagram, the attacker exploits the network and sets up a pivot on 192.168.0.10 to gain further visibility into the internal network. Upon doing more recon, the attacker comes across a system that has two NICs:
![](https://static.packt-cdn.com/products/9781788995238/graphics/assets/4a8d963f-968a-4011-b547-5ce83a689fba.png)
Once the attacker gains access to 192.168.0.11, they can then add a pivot again which will allow them access to 172.4.19.0 subnet. This is known as multi-level pivoting. The following diagram explains this:
![](https://static.packt-cdn.com/products/9781788995238/graphics/assets/b265db64-4777-44e9-abcf-272071373c76.png)
As explained previously, we found a system in the 172.4.19.0 system which has another IP assigned to it. We exploited that system and added a...