References

Type
Url
Description

technique

https://twitter.com/r0wdy_/status/936365549553991680

@r0wdy_. (2017, November 30). Service Recovery Parameters. Retrieved April 9, 2018.


technique

https://capec.mitre.org/data/definitions/478.html


technique

https://attack.mitre.org/techniques/T1574/011


technique

https://www.circl.lu/services/passive-dns/

CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020.


technique

https://dnsdumpster.com/

Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020.


technique

https://attack.mitre.org/techniques/T1596/001


technique

https://pages.arbornetworks.com/rs/082-KNA-087/images/13th_Worldwide_Infrastructure_Security_Report.

Philippe Alcoy, Steinthor Bjarnason, Paul Bowen, C.F. Chui, Kirill Kasavchnko, and Gary Sockrider of Netscout Arbor. (2018, January). Insight into the Global Threat Landscape - Netscout Arbor's 13th Annual Worldwide Infrastructure Security Report. Retrieved April 22, 2019.


technique

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/nf-detct

Cisco. (n.d.). Detecting and Analyzing Network Threats With NetFlow. Retrieved April 25, 2019.


technique

https://attack.mitre.org/techniques/T1499/003


technique

https://www.virusbulletin.com/uploads/pdf/conference/vb2014/VB2014-Wardle.pdf

Patrick Wardle. (2014, September). Methods of Malware Persistence on Mac OS X. Retrieved July 5, 2017.