When conducting a penetration test, a pivot is used to describe a scenario in which
A . the penetration tester uses pass-the-hash to gain access to a server via SMB, and then uses this server to SSH to another server.
B . a penetration tester is able to download the Active Directory database after exploiting an unpatched vulnerability on the domain controller
C . the vulnerability scanner reveals a flaw in SMB signing, which can be used to send a netcat recon tool to one of the servers on the network.
D . the penetration tester is able to access the datacenter or network closet by using a lockpick.
Answer: A