m (Protected "Category:Command and Control" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) |
No edit summary |
||
Line 1: | Line 1: | ||
Command and Control | =Description= | ||
Command and Control refers to the techniques utilized by cyber adversaries to communicate and maintain control over compromised systems within a target network. These techniques aim to blend in with normal network traffic to evade detection. Adversaries use a variety of methods to establish Command and Control, ranging from stealthy to overt, depending on the defenses in place within the target network. |
Latest revision as of 14:55, 29 January 2023
Description
Command and Control refers to the techniques utilized by cyber adversaries to communicate and maintain control over compromised systems within a target network. These techniques aim to blend in with normal network traffic to evade detection. Adversaries use a variety of methods to establish Command and Control, ranging from stealthy to overt, depending on the defenses in place within the target network.
Subcategories
This category has the following 2 subcategories, out of 2 total.
C
- Cobalt Strike (2 P)
T
- Tunneling & Port Forwarding (4 P)
Pages in category "Command and Control"
The following 8 pages are in this category, out of 8 total.