Category:Command and Control: Difference between revisions

Category page
m (Protected "Category:Command and Control" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite)))
No edit summary
 
Line 1: Line 1:
Command and Control consists of techniques that adversaries may use to communicate with systems under their control within a victim network. Adversaries commonly attempt to mimic normal, expected traffic to avoid detection. There are many ways an adversary can establish command and control with various levels of stealth depending on the victim’s network structure and defenses.
=Description=
Command and Control refers to the techniques utilized by cyber adversaries to communicate and maintain control over compromised systems within a target network. These techniques aim to blend in with normal network traffic to evade detection. Adversaries use a variety of methods to establish Command and Control, ranging from stealthy to overt, depending on the defenses in place within the target network.

Latest revision as of 14:55, 29 January 2023

Description

Command and Control refers to the techniques utilized by cyber adversaries to communicate and maintain control over compromised systems within a target network. These techniques aim to blend in with normal network traffic to evade detection. Adversaries use a variety of methods to establish Command and Control, ranging from stealthy to overt, depending on the defenses in place within the target network.

Subcategories

This category has the following 2 subcategories, out of 2 total.