Now for the firewall evasion. From the DMZ box, she launched her DNS tunneling script. The firewall’s App-ID saw standard DNS requests to an external server she controlled. It allowed them. Inside those DNS queries, her reverse shell rode out, then back in to pivot to the internal network.

Maya’s skin prickled. Honeypots weren't just traps. They were misdirections. At 3:45 AM, the lecture ended. A final screen appeared:

Maya leaned back, grinning. Ghost. By 1:00 AM, she hit the firewall module. This was her nemesis. Corporate firewalls had stymied her for months—stateful, application-aware, deep-packet-inspecting behemoths.

He showed her how to spot the lie.

She’d been waiting six months for this. Her boss, a grizzled veteran named Viktor, had given her a simple ultimatum: "Learn to be a ghost, or stick to scanning open ports for the rest of your career." He’d pointed her to a blacked-out module in their internal training portal: Advanced Adversary Emulation: Evading IDS, Firewalls, and Honeypots.