recently is was reading the two diy guides of hackback
i read according to his guide he uses hacked servers to hide the ip from the stable servers
(in this case I think he was referring to the vps the name stable servers )
i was reading about pivoting but the techniques exposed using metasploit was oriented to access to the other ips of the internal network and use it too for routing traffic from a normally non-routable network.
then i was wondering how did he do that?
how blackhats/hacktivist uses a owned server to hide/mask the ip of another server ?
and how companies can protect themselves from this kind of cyber attacks (?)