Watch this video on YouTube
After successfully infiltrating a server and attaining root access, Alex aims to pivot and discreetly transfer traffic across the network while avoiding detection by any potential Intrusion Detection System. What would be the optimal strategy?