| http://www.w3.org/ns/prov#value | - Targeted Attacks ??? Harpooning a WhaleData exfil ??? Post-exploitation, Poison Ivy and other tools to establish foothold ??? Download other tools to impersonate users, elevate privileges, collect data from network ??? Encode, archive collected data ??? Check in with series of C2 for activity commands ??? Facebook, Google Code, Image Files (jpg, gif, etc) ??? FTP PUT / HTTP POST encoded/crypted da
|