Non-Application Layer Protocol
Adversaries may use an OSI non-application layer protocol for communication between host and C2 server or among infected hosts within a network. The list of possible protocols is extensive.(Citation: Wikipedia OSI) Specific examples include use of network layer protocols, such as the Internet Control Message Protocol (ICMP), transport layer protocols, such as the User Datagram Protocol (UDP), session layer protocols, such as Socket Secure (SOCKS), as well as redirected/tunneled protocols, such a...
BY SOURCE
PROCEDURES (16)
Auto-extracted: 3 detections for persist
Auto-extracted: 2 detections for bypass
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 2 detections for remote
Auto-extracted: 2 detections for tunnel
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for cloud monitoring
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for child process
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for child process
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for suspicious