Get a Pentest and security assessment of your IT network.

News

Commonly Used Port

Commonly Used Port Technique ID T0885 Tactic Command and Control Data Sources Network Traffic : Network Traffic Flow External Contributors Matan Dobrushin. Adversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend in with normal network activity. They may use the protocol associated with the port, or a completely different protocol, to avoid more detailed inspection of the network. Examples provided below include Dragonfly 2.0, Stuxnet and Triton.”]

Source: https://collaborate.mitre.org/attackics/index.php/Technique/T0885

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months