• Post author:
  • Post category:Updated
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

What is the objective the threat actor in establishing a two-way communication channel between the target system and a CnC infrastructure?

  • to launch a buffer overflow attack
  • to send user data stored on the target to the threat actor
  • to steal network bandwidth from the network where the target is located
  • to allow the threat actor to issue commands to the software that is installed on the target
Explanation & Hint:

To allow the threat actor to issue commands to the software that is installed on the target

Establishing a two-way communication channel between a compromised system and a Command and Control (CnC) server is a common tactic used by threat actors. This channel serves as a remote control pathway, granting the attacker the ability to direct the compromised system’s actions. It essentially turns the system into a puppet that can be manipulated at will. The objectives for establishing such a channel include:

  • Command execution: The attacker can run arbitrary commands, which may include deploying additional malware, spreading within the network, or sabotaging systems.
  • Data exfiltration: Sensitive information can be stolen and sent back to the CnC server.
  • Persistence: The attacker can ensure continued access to the system for future malicious activities.
  • Real-time control: Unlike one-way communication, a two-way channel allows for dynamic interaction, adapting the attack in response to changes in the environment or to evade detection.

The other options mentioned, like launching a buffer overflow attack, sending user data, or stealing bandwidth, are potential uses of the established channel but are not its primary objective. A buffer overflow is a specific attack technique that may be delivered via a CnC channel, but the channel itself is not established for this purpose. Similarly, sending user data and stealing bandwidth are actions that could be performed through the channel but are not the fundamental reason for its existence.

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 26 – 28: Analyzing Security Data Group Exam Answers Full 100%

Notify of
Inline Feedbacks
View all comments