EXPLORE
← Back to Explore
T1001.003

Protocol or Service Impersonation

Adversaries may impersonate legitimate protocols or web service traffic to disguise command and control activity and thwart analysis efforts. By impersonating legitimate protocols or web services, adversaries can make their command and control traffic blend in with legitimate network traffic. Adversaries may impersonate a fake SSL/TLS handshake to make it look like subsequent traffic is SSL/TLS encrypted, potentially interfering with some security tooling, or to make the traffic look like it ...

ESXiLinuxmacOSWindows
2
Detections
1
Sources
3
Threat Actors

BY SOURCE

2sigma

PROCEDURES (2)

General Monitoring1 detections

Auto-extracted: 1 detections for general monitoring

File Monitoring1 detections

Auto-extracted: 1 detections for file monitoring

DETECTIONS (2)