Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
5 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Proxy | Command And Control | Adversaries may use a connection proxy to direct network traffic between systems or act as an interm… | Edit | |
| Proxy: Domain Fronting | Command And Control | Adversaries may take advantage of routing schemes in Content Delivery Networks (CDNs) and other serv… | Edit | |
| Proxy: External Proxy | Command And Control | Adversaries may use an external proxy to act as an intermediary for network communications to a comm… | Edit | |
| Proxy: Internal Proxy | Command And Control | Adversaries may use an internal proxy to direct command and control traffic between two or more syst… | Edit | |
| Proxy: Multi-hop Proxy | Command And Control | Adversaries may chain together multiple proxies to disguise the source of malicious traffic. Typical… | Edit |