Watch this video on YouTube
Which of the following techniques does an adversary use to communicate remotely with compromised systems through an encrypted session, where the adversary can steal data, delete data, and launch further attacks through the encrypted channel?