This is a dedicated watch page for a single video.
A security analyst at ABC Corp detects suspicious outgoing traffic on TCP port 5050 from a workstation. The logs indicate persistent connections to an external IP address, and further investigation reveals the presence of a proxy tunneling tool that allows attackers to bypass security controls and exfiltrate data. Which type of service is most likely being abused in this scenario?