Encrypted Channel
Adversaries may employ a known encryption algorithm to conceal command and control traffic.
Description
Adversaries may employ a known encryption algorithm to conceal command and control traffic.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
SSL/TLS Inspection
Quick Info
- Technique ID
- T1573
- Tactic
- C2
- Sub-Techniques
- 2
- Mitigations
- 1
