Commands that help you pivot to other systems from a compromised system.
- Networking Commands - Gathering system information about network interfaces and such.
- Remote Movement - Commands that move data and files between systems on a network.
Commands that help you pivot to other systems from a compromised system.