You work on an incident response team. You are tasked with identifying malicious beaconing traffic that is leaving your network and communicating with an external C2 server. Which traffic type will be your primary focus?
- Cobalt Strike packets
- IPsec packets
- tunneled traffic
- IPv6 packets
Explanation & Hint:
When tasked with identifying malicious beaconing traffic that is communicating with an external Command-and-Control (C2) server, your primary focus should be on “tunneled traffic.” Tunneled traffic refers to the use of various tunneling protocols that encapsulate one protocol or session inside another. Malicious actors often use such methods to hide their communications with C2 servers. This can include using common protocols like HTTP or HTTPS to disguise the traffic as normal web browsing, or more complex methods like VPN tunnels, SSH tunneling, or even DNS tunneling. By focusing on tunneled traffic, you can look for patterns or anomalies that might indicate beaconing, such as regular, periodic traffic to an unknown external server, which is a common characteristic of C2 communication. The other options provided are less specific or less likely to be directly related to C2 beaconing:
|