A computer attacker has compromised a system by implanting a script that will send 10B packages over port 150. This port is also used for sending heartbeat messages to a central monitoring server. Which of the following BEST describes the tactic used to execute this attack?
Nancey
14 hours agoZack
3 days agoDalene
12 days agoKimi
19 days agoGertude
20 days agoNorah
22 days ago