You have compromised a server and successfully gained a root access. You want to pivot and pass traffic undetected over the network and evade any possible Intrusion Detection System. What is the best approach?
A.
Use Alternate Data Streams to hide the outgoing packets from this server.
B.
Use HTTP so that all traffic can be routed vis a browser, thus evading the internal Intrusion Detection Systems.
C.
Install Cryptcat and encrypt outgoing packets from this server.
D.
Install and use Telnet to encrypt all outgoing traffic from this server.
CryptCat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol while encrypting the data being transmitted.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
andrewdh
Highly Voted 2 years, 6 months agoVincent_Lu
Most Recent 7 months agoHackeram
10 months, 2 weeks agoDaniel8660
1 year, 6 months agoANDRESCB1988
2 years, 9 months ago