Adversaries may communicate using application layer protocols to avoid detection by blending in with existing traffic.
APT groups commonly use HTTPS for C2 communications, making traffic analysis difficult as it blends with legitimate web traffic.
Ready to learn more techniques and test your knowledge?