A covert channel is a communication method used to transfer information in a way that violates security policy, often by repurposing legitimate protocols or functions for unauthorized communication.
From CEH v13 Official Courseware:
Module 6: Malware Threats
Topic: Covert Communication and Data Exfiltration Techniques
CEH v13 Study Guide states:
“A covert channel exploits unintended uses of legitimate communication protocols. It allows data to be transmitted without detection by hiding the communication inside seemingly benign traffic.”
Incorrect Options:
A: A non-standard port may aid in hiding services, but doesn’t constitute a covert channel.
C: Multiplexing is a normal communication mechanism.
D: WEP is insecure, but this isn’t related to covert channels.
[Reference:CEH v13 Study Guide – Module 6: Covert Communication ChannelsNIST SP 800-30 – Covert Channels in Security Models, ==================================================================, ]
Submit