2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA) 2023
DOI: 10.1109/icidca56705.2023.10100279
|View full text |Cite
|
Sign up to set email alerts
|

Weaponizing Real-world Applications as C2 (Command and Control)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…This framework generally alludes to the strategies that adversaries can manipulate to facilitate undetected message exchange or payload delivery for Data Exfiltration (DE) or delivery stages. Subsumed within this classification are procedures such as encrypted Hypertext Transfer Protocol (HTTP), Traffic (EHT) [30], Custom DNS protocol (CDP), and Hypertext Transfer Protocol Secure (HTTPS) Protocol (HSP) [31]. In terms of liaising with the C2 server, malicious activities, or command execution (CE), can be effectuated through highly deceptive custom protocols, which convincingly masquerade as their legitimate counterparts.…”
Section: Common Techniques In Aptsmentioning
confidence: 99%
“…This framework generally alludes to the strategies that adversaries can manipulate to facilitate undetected message exchange or payload delivery for Data Exfiltration (DE) or delivery stages. Subsumed within this classification are procedures such as encrypted Hypertext Transfer Protocol (HTTP), Traffic (EHT) [30], Custom DNS protocol (CDP), and Hypertext Transfer Protocol Secure (HTTPS) Protocol (HSP) [31]. In terms of liaising with the C2 server, malicious activities, or command execution (CE), can be effectuated through highly deceptive custom protocols, which convincingly masquerade as their legitimate counterparts.…”
Section: Common Techniques In Aptsmentioning
confidence: 99%