A computer attacker has compromised a system by implanting a script that will send 10B packages over port 150. This port is also used for sending heartbeat messages to a central monitoring server. Which of the following BEST describes the tactic used to execute this attack?
Marcos
18 days agoGlennis
20 days agoNancey
21 days agoZack
23 days agoDalene
1 months agoKimi
1 months agoGertude
1 months agoNorah
1 months agoLeota
20 days ago