Get a Pentest and security assessment of your IT network.

News

Commonly Used Port

Commonly Used Port Technique ID T0885 Tactic Command and Control Data Sources Network Traffic : Network Traffic Flow External Contributors Matan Dobrushin. Adversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend in with normal network activity. They may use the protocol associated with the port, or a completely different protocol, to avoid more detailed inspection of the network. Examples provided below include Dragonfly 2.0, Stuxnet and Triton.”]

Source: https://collaborate.mitre.org/attackics/index.php/Technique/T0885

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

Botnet authors use Evernote account as C&C Server

News

Canadian agency breached as hackers exploit CVE-2017-5638 flaw in Apache Struts 2