Encrypted Channel
Adversaries may employ a known encryption algorithm to conceal command and control traffic.
Description
Adversaries may employ a known encryption algorithm to conceal command and control traffic.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Network Intrusion PreventionSSL/TLS Inspection
Quick Info
- Technique ID
- T1677
- Tactic
- Impact
- Mitigations
- 2
