An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet.
After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.
Which obfuscation technique is the attacker using?
Click on the arrows to vote for the correct answer
A. B. C. D.B.