Non-Standard Port
Adversaries may communicate using a protocol and port pairing that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443. Adversaries may make changes to the standard port used by a protocol to bypass filtering or muddle analysis/parsing of network data. Adversaries may also make changes to victim systems to abuse non-standard ports. For example, Registry ke...
BY SOURCE
PROCEDURES (12)
Auto-extracted: 3 detections for network connection monitoring
Auto-extracted: 3 detections for c2
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for command and control
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for bypass