Tunneling

any protocol can be used as a underlaid transportation protocol, like ICMP, DNS, SMB, HTTP. It’s effective since lots of perimeter defense either ignore them or isn’t capable of analyze them1


  1. [[Flying A False Flag: Advanced C2, Trust Conflicts, and Domain Takeover]] ↩︎