CyberTactics

We are working hard to collect all tactical cyber lesson for your knowledge and experience.

Covert Channels

  • Communication channels that disguises data while it moves across the network to avoid detection 
  • Require a client and server 
  • Can be used to remotely control a machine and to secretly transfer files or applications





Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Newer Post Older Post Home

Archive

  • ▼  2015 (39)
    • ▼  September (39)
      • Proxy Logs - HTTP
      • Analysis Proxy Logs
      • Log Analysis – VPN & Radius Logs
      • Router & Switch Logs
      • DHCP Logs Analysis : DNS Unauthorized Network Exte...
      • DHCP Logs Analysis : DNS Multiple IPs
      • Analysis DHCP Logs
      • Analysis – DNS Logs: Hi-Jacking
      • DNS Logs (Malware) Example #2- Intrusion
      • DNS Log Analysis
      • Infrastructure Logs and Overview
      • Windows Firewall Logs: Analysis Suspected logs
      • Analysis Windows Firewall Logs
      • Windows Firewall Logs
      • Windows Event Logs
      • Other Apache Logs
      • Log Analysis – Apache Logs
      • Log Analysis – Apache Logs : Access Log
      • Apache and Its Logs
      • Log Analysis - IIS Logs
      • Log Analysis
      • Understanding Common Log Attributes
      • Programs for Log Analysis
      • Analyzing Logs
      • What can logs do for?
      • What’s Logging?
      • Covert_TCP
      • Reverse WWW Shell (HTTP)
      • ICMP Tunnel / ICMPTX
      • Covert Channels (Tunneling)
      • Covert Channels
      • Alternate Data Streams (NTFS)
      • Creating Hidden Files in Windows
      • Creating Hidden Files and Directories in UNIX
      • Unix Shell History Files
      • Altering Accounting Files in Unix
      • Altering System Logs in Unix
      • Altering Event Logs in Windows
      • Hiding Evidence by Altering Logs
CyberTactic. Simple theme. Powered by Blogger.