From the course: Cisco CCNP SCOR Security (350-701) Cert Prep: 3 Endpoint Protection and Secure Access

Unlock this course with a free trial

Join today to access over 22,600 courses taught by industry experts.

HTTPS

HTTPS

- [Instructor] Another method that attackers use for data exfiltration is HTTP or HTTPS. There are a few different ways that this can be accomplished, but the main variation we see for this is by using a backdoor. A backdoor is a type of attack that gives a threat actor unauthorized access to a system. Backdoors have been linked to many well known attacks against the retail industry, such as the attack on the Target Corporation a few years back. Typically, these are created by malware that gets installed onto a device, which can create unauthorized access to the device over the public internet in various ways, such as opening a port to public internet. The main goal of a backdoor is to be discreet. That is to say, backdoors are most successful when they are able to be in place for long periods of time without the user being aware. The longer the attacker has access, the more data they can potentially exfiltrate. With backdoor access in place, attackers may use HTTP to transmit data…

Contents