A covert channel is any communication path that allows data to be transferred in violation of a system’s security policy. It’s commonly used by malware or Trojans to exfiltrate data or send commands undetected.
Examples include:
Encoding data in TCP headers (unused bits)
Timing of packets (timing channel)
Use of legitimate protocols to piggyback malicious traffic
From CEH v13 Courseware:
Module 6: Malware Threats → Trojans and Covert Channels
[Reference:CEH v13 Study Guide – Module 6: Trojan Communication → Covert and Overt ChannelsNIST SP 800-53 – Covert Channel Analysis, ==================================================================, ]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit