Joined Adversary Simulation Manual
search
⌘Ctrlk
Joined Adversary Simulation Manual
  • Joined Adversary Simulation Manual
  • Reconnaissance
  • Resource Development
  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
  • Command and Control
    • Application Layer Protocol
    • Communication Through Removable Media
    • Data Encoding
    • Data Obfuscation
    • Dynamic Resolution
    • Encrypted Channel
    • Fallback Channels
    • Ingress Tool Transfer
    • Multi-Stage Channels
    • Non-Application Layer Protocol
    • Non-Standard Port
    • Protocol Tunneling
    • Proxy
    • Remote Access Software
    • Traffic Signaling
    • Web Service
  • Exfiltration
  • Impact
  • General Pentesting
  • Tricks
  • Tools
  • Contributors
  • Kudos, References and Further Reading
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Command and Control

Application Layer Protocolchevron-rightCommunication Through Removable Mediachevron-rightData Encodingchevron-rightData Obfuscationchevron-rightDynamic Resolutionchevron-rightEncrypted Channelchevron-rightFallback Channelschevron-rightIngress Tool Transferchevron-rightMulti-Stage Channelschevron-rightNon-Application Layer Protocolchevron-rightNon-Standard Portchevron-rightProtocol Tunnelingchevron-rightProxychevron-rightRemote Access Softwarechevron-rightTraffic Signalingchevron-rightWeb Servicechevron-right
PreviousVideo Capturechevron-leftNextApplication Layer Protocolchevron-right

Last updated 4 years ago

Was this helpful?

Was this helpful?