Skip to the content.

back

Find sigma rule :x:

Attack: Exfiltration Over C2 Channel

Adversaries may steal data by exfiltrating it over an existing command and control channel. Stolen data is encoded into the normal communications channel using the same protocol as command and control communications.

MITRE

Tactic

technique

Test : Text Based Data Exfiltration using DNS subdomains

OS

Description:

Simulates an adversary using DNS tunneling to exfiltrate data over a Command and Control (C2) channel.

Executor

powershell

Sigma Rule

back