An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.
Which obfuscation technique is the attacker using?
mariodesa
Highly Voted 1 year, 4 months agoEng_ahmedyoussef
Most Recent 8 months agocy_analyst
8 months agoMevijil
1 year, 3 months agoseriously5000
1 year, 4 months agotor_nana
1 year, 5 months ago