Esc
Non-Application Layer Protocol - T1095
(ATT&CK® Technique)
Definition
Adversaries may use an OSI non-application layer protocol for communication between host and C2 server or among infected hosts within a network. The list of possible protocols is extensive. Specific examples include use of network layer protocols, such as the Internet Control Message Protocol (ICMP), transport layer protocols, such as the User Datagram Protocol (UDP), session layer protocols, such as Socket Secure (SOCKS), as well as redirected/tunneled protocols, such as Serial over LAN (SOL).
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.