Exploitation for Client Execution

Description

Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. 

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Execution