Covert Channel: The Hidden Network
Generally, the hacker uses a hidden network to escape themselves from firewall and IDS such. In this post, you will learn how to steal information from the target machine through the undetectable network. Such type of network is known as a covert channel which seems as generic traffic to any network monitor device/application and network admin. It could be considered as steganography, but it is not exactly steganography. Two endpoint users can use the covert channel for undetectable communication from network admin.
The red teamers use covert channels for data exfiltration in red teaming operations through a legitimate network and the data exfiltration is a process of secretly sharing data between two endpoints.
Table of Content
What is Covert channel
- Type of covert channel
Covert channel attack using tunnelshell
- What is Tunnelshell
- Covert ICMP Channel
- Covert HTTP Channel
- Covert DNS Channel
Full Article Read Here