CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework
T1572C2

Protocol Tunneling

Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering.

Description

Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering.

Quick Info

Technique ID
T1572
Tactic
C2
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.