Exfiltration Over C2 Channel

From RCATs
Revision as of 15:36, 26 January 2023 by SourMilk (talk | contribs) (Created page with "Category:Exfiltration Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.