Question: Using only the HTTP/HTTPS protocol, the attacker wants to exfiltrate a large amount of data from the company. Explain how the attacker can do that
Step by Step Solution
There are 3 Steps involved in it
Exfiltrating a large amount of data using only the HTTPHTTPS protocol can be challenging for an attacker as web traffic typically involves sending and ... View full answer
Get step-by-step solutions from verified subject matter experts
