TOR Traffic
Proxy, Multi-hop Proxy
Proxy, Multi-hop Proxy
Proxy, Multi-hop Proxy
Web Service
Ingress Tool Transfer
Exploit Public-Facing Application, Ingress Tool Transfer, Command and Scripting Interpreter
Ingress Tool Transfer
Steal or Forge Authentication Certificates, Ingress Tool Transfer
PowerShell, Ingress Tool Transfer
PowerShell, Ingress Tool Transfer, Fileless Storage
Internal Proxy, Proxy
Internal Proxy, Proxy
Ingress Tool Transfer, Domain Groups
Internal Proxy, Proxy
Internal Proxy, Proxy
Command and Scripting Interpreter, PowerShell, Ingress Tool Transfer
Command and Scripting Interpreter, PowerShell, Ingress Tool Transfer
Domain Generation Algorithms
Domain Generation Algorithms
Protocol Tunneling, Proxy, Web Service
Protocol Tunneling, Proxy, Web Service
Protocol Tunneling, Proxy, Web Service
Protocol Tunneling, Proxy, Web Service
Protocol Tunneling, Proxy, Web Service
Protocol Tunneling, Proxy, Web Service
DNS, Application Layer Protocol
DNS, Application Layer Protocol
BITS Jobs, Ingress Tool Transfer
Protocol Tunneling, Proxy, Web Service
Protocol Tunneling, Proxy, Web Service
Protocol Tunneling, Proxy, Web Service
Application Layer Protocol
Encrypted Channel
Encrypted Channel
Application Layer Protocol
Mail Protocols, Application Layer Protocol
Mail Protocols, Application Layer Protocol
Mail Protocols, Application Layer Protocol
Mail Protocols, Application Layer Protocol
Mail Protocols, Application Layer Protocol
Mail Protocols, Application Layer Protocol
Protocol Tunneling, SSH
Ingress Tool Transfer
Ingress Tool Transfer, Exploit Public-Facing Application, Command and Scripting Interpreter, External Remote Services
Ingress Tool Transfer, Exploit Public-Facing Application, Command and Scripting Interpreter, External Remote Services
Ingress Tool Transfer
Remote Access Software, OS Credential Dumping
Remote Access Software
Ingress Tool Transfer
Proxy, Non-Application Layer Protocol
Proxy, Non-Application Layer Protocol
Ingress Tool Transfer
Ingress Tool Transfer
Application Layer Protocol
Remote Access Software
Protocol Impersonation
BITS Jobs, Ingress Tool Transfer
Ingress Tool Transfer
Ingress Tool Transfer
BITS Jobs, Ingress Tool Transfer
Ingress Tool Transfer
Ingress Tool Transfer
Ingress Tool Transfer
Ingress Tool Transfer
Ingress Tool Transfer, Exfiltration Over Web Service, System Binary Proxy Execution
Ingress Tool Transfer
Ingress Tool Transfer
Ingress Tool Transfer
Ingress Tool Transfer
Ingress Tool Transfer
File Transfer Protocols, Application Layer Protocol
File Transfer Protocols, Application Layer Protocol
Web Protocols
DNS, Application Layer Protocol
DNS, Application Layer Protocol
Non-Application Layer Protocol