What tool and process are you going to use in order to remain undetected by an IDS while pivoting and passing
traffic over a server you’ve compromised and gained root access to?
A.
Install and use Telnet to encrypt all outgoing traffic from this server.
B.
Install Cryptcat and encrypt outgoing packets from this server.
C.
Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection
Systems.
D.
Use Alternate Data Streams to hide the outgoing packets from this server.
B