A computer attacker has compromised a system by implanting a script that will send 10B packages over port 150. This port is also used for sending heartbeat messages to a central monitoring server. Which of the following BEST describes the tactic used to execute this attack?
Marcos
30 days agoCarla
2 days agoGlennis
1 months agoBeckie
4 days agoNancey
1 months agoZack
1 months agoDalene
1 months agoKimi
2 months agoGertude
2 months agoNorah
2 months agoJennie
12 hours agoGlendora
2 days agoTimothy
2 days agoElenore
5 days agoLeota
1 months ago