In this recipe, we will leverage a host as a beachhead to exploit other hosts.
While this recipe may not sound appropriate for the topic of the chapter, one of the best ways of maintaining access to a target network is to have more hosts exploited that you can use for your communication channel. You can also have them use various forms of methods to reach out, so that if one is discovered you have access to others through different means.