During a penetration test, you have successfully exploited a vulnerability on a target system. Which of the following options is the BEST method to establish a persistent and covert remote access channel?
Configure a VPN connection back to the attacker’s machine
Set up an SSH server on the target system for remote access
Install a new remote desktop software package on the target system
Deploy a reverse shell with a listener on the attacker's machine