This is a dedicated watch page for a single video.
Ben has successfully hacked the server and gained root privileges. Now, he wants to pivot and stealthily route the traffic over the network, avoiding detection by the IDS. Which of the following would be the best solution for Ben?