Skip to the content.

Logo

The techniques chosen for the analysis are described below. They are classified into the different security and privacy tests performed:

(Back Testing)

Logo

To sum up, there are mainly four techniques that should be considered. "Unsecured credentials" is the most important as it has a worse visibility and detection coverage while being commonly used by cyber groups.

The other three, “Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol”, “System Network Configuration Discovery” and “Data from cloud storage object”, have the same characteristics except for visibility coverage, which is better than in the previous technique.

(Back Testing)