Mythic
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Mythic supports HTTP-based C2 profiles.(Citation: Mythc Documentation) |
.002 | Application Layer Protocol: File Transfer Protocols |
Mythic supports SMB-based peer-to-peer C2 profiles.(Citation: Mythc Documentation) |
||
.004 | Application Layer Protocol: DNS |
Mythic supports DNS-based C2 profiles.(Citation: Mythc Documentation) |
||
Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography |
Mythic supports SSL encrypted C2.(Citation: Mythc Documentation) |
Enterprise | T1090 | .001 | Proxy: Internal Proxy |
Mythic can leverage a peer-to-peer C2 profile between agents.(Citation: Mythc Documentation) |
.002 | Proxy: External Proxy |
Mythic can leverage a modified SOCKS5 proxy to tunnel egress C2 traffic.(Citation: Mythc Documentation) |
||
.004 | Proxy: Domain Fronting |
Mythic supports domain fronting via custom request headers.(Citation: Mythc Documentation) |
References
- Insikt Group. (2022, January 18). 2021 Adversary Infrastructure Report. Retrieved March 25, 2022.
- Thomas, C. (2018, July 4). Mythic. Retrieved March 25, 2022.
- Thomas, C. (2020, August 13). A Change of Mythic Proportions. Retrieved March 25, 2022.
- Thomas, C. (n.d.). Mythc Documentation. Retrieved March 25, 2022.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.