Evasive File Smuggling with Skyhook
ATT&CK techniques detected
T1572Protocol Tunneling
35%
". readers should also avoid confusing skyhook ’ s round - trip obfuscation cycle with end - to - end encryption ( e2ee ). e2ee intends to assure that data is recoverable only by entities with the encryption keys, where skyhook does the opposite : it obfuscates data long enough to…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary

ImposterKeanu // Introduction This blog post introduces the reader to “The Obfuscation Hustle”, a term I enjoy using to describe the tedious process of obfuscating and delivering files to corporate […]
The post Evasive File Smuggling with Skyhook appeared first on Black Hills Information Security, Inc..