A penetration tester has gained a shell on a public-facing web server (10.0.0.5). During internal reconnaissance, they discover an internal network segment (192.168.1.0/24) connected to the server's second network interface. To scan this internal network from their attack machine, which technique must they employ?
-
A
Pivoting
-
B
DNS Zone Transfer
-
C
Credential Stuffing
-
D
Brute-Forcing