A PenTester is using a tool that allows the PenTester to pivot from one host to another exfiltrating files from each target to the PenTester's own host. What tool is the PenTester most likely using?
a. Nmap
b. Ettercap
c. RAT
d. Registry
e. Cron job
f. Netcat