Exfiltration Over Asymmetric Encrypted Non-C2 Protocol

From RCATs
Revision as of 15:35, 26 January 2023 by SourMilk (talk | contribs) (Created page with "Category:Exfiltration Over Alternative Protocol Adversaries may steal data by exfiltrating it over an asymmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Adversaries may steal data by exfiltrating it over an asymmetrically encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.