A penetration tester has established a foothold inside a network and wants to conduct reconnaissance inside while remaining anonymous. What could they use to best accomplish this?
1) Virtual Private Network (VPN)
2) Proxy Server
3) Tor Network
4) Intrusion Detection System (IDS)