Which technique is used to access resources on other systems in the target network via the compromised system, with requests appearing to originate from the initially compromised host?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which technique is used to access resources on other systems in the target network via the compromised system, with requests appearing to originate from the initially compromised host?

Explanation:
Relaying traffic through a compromised host to reach other machines in the target network is about using that foothold as a gateway or proxy. Once you have control of one system, you forward your session or traffic through it to access additional hosts. The requests appear to come from the compromised host because the traffic is generated by that machine’s network path, not directly from your own machine. This enables lateral movement inside the network while keeping your origin hidden. In practice, you might set up port forwarding or a SOCKS proxy on the compromised host and route your tool’s traffic through it to targets further inside the network.

Relaying traffic through a compromised host to reach other machines in the target network is about using that foothold as a gateway or proxy. Once you have control of one system, you forward your session or traffic through it to access additional hosts. The requests appear to come from the compromised host because the traffic is generated by that machine’s network path, not directly from your own machine. This enables lateral movement inside the network while keeping your origin hidden. In practice, you might set up port forwarding or a SOCKS proxy on the compromised host and route your tool’s traffic through it to targets further inside the network.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy