Non-Application Layer Protocol
Adversaries may use an OSI non-application layer protocol for communication between host and C2 server or among infected hosts.
Description
Adversaries may use an OSI non-application layer protocol for communication between host and C2 server or among infected hosts.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Filter Network TrafficNetwork Intrusion Prevention
Quick Info
- Technique ID
- T1095
- Tactic
- C2
- Mitigations
- 2
