FTP operates on a client-server model, using two distinct communication channels between the FTP client […]
Protocols: HTTPS
In the digital age, secure communication is paramount. Two fundamental protocols govern how data is […]
Protocols: HTTP
The Hypertext Transfer Protocol (HTTP) is a fundamental application-layer protocol that powers the vast majority […]
Protocols: UDP
When we think about sending data online, we often picture reliable delivery – like sending […]
Protocols: TCP
You’re Browsing the web, sending an email, streaming a video, or perhaps even engaged in […]
Impact (Mitre Att&ck Matrix)
The MITRE ATT&CK Framework defines 13 techniques within the Impact category. These techniques describe how […]
Exfiltration (Mitre Att&ck Matrix)
The Mitre Att&ck Framework has defined nine techniques in the Exfiltration category. The Automated Exfiltration […]
Command & Control (Mitre Att&ck Matrix)
The Mitre Att&ck Matrix has 16 techniques in the Command and Control Category. Application Layer […]
Collection (Mitre Att&ck Matrix)
The Mitre Att&ck Matrix has defined 17 techniques for the Collection Category. Adversary-In-The-Middle is when […]
Lateral Movement (Mitre Att&ck Matrix)
Mitre Att&ck Matrix has defined nine techniques to cover Lateral Movement. Lateral Movement is tied […]