List of questions
Related questions
Question 56 - SPLK-5001 discussion
What is the following step-by-step description an example of?
1. The attacker devises a non-default beacon profile with Cobalt Strike and embeds this within a document.
2. The attacker creates a unique email with the malicious document based on extensive research about their target.
3. When the victim opens this document, a C2 channel is established to the attacker's temporary infrastructure on a compromised website.
A.
Tactic
B.
Policy
C.
Procedure
D.
Technique
Your answer:
0 comments
Sorted by
Leave a comment first