Proxy
Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications.
Description
Adversaries may use a connection proxy to direct network traffic between systems or act as an intermediary for network communications.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Filter Network TrafficNetwork Intrusion Prevention
Quick Info
- Technique ID
- T1090
- Tactic
- C2
- Sub-Techniques
- 4
- Mitigations
- 2
