technique
https://twitter.com/r0wdy_/status/936365549553991680
@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.
technique
https://capec.mitre.org/data/definitions/478.html
technique
https://attack.mitre.org/techniques/T1574/011
technique
https://www.circl.lu/services/passive-dns/
CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020.
technique
https://dnsdumpster.com/
Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020.
technique
https://attack.mitre.org/techniques/T1596/001
technique
https://pages.arbornetworks.com/rs/082-KNA-087/images/13th_Worldwide_Infrastructure_Security_Report.
Philippe Alcoy, Steinthor Bjarnason, Paul Bowen, C.F. Chui, Kirill Kasavchnko, and Gary Sockrider of Netscout Arbor. (2018, January). Insight into the Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report. Retrieved April 22, 2019.
technique
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct
Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.
technique
https://attack.mitre.org/techniques/T1499/003
technique
https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf
Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.