Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

09/02/2022
by   Gonçalo Xavier, et al.
0

Command and Control (C2) communication is a key component of any structured cyber-attack. As such, security operations actively try to detect this type of communication in their networks. This poses a problem for legitimate pentesters that try to remain undetected, since commonly used pentesting tools, such as Metasploit, generate constant traffic patterns that are easily distinguishable from regular web traffic. In this paper we start with these identifiable patterns in Metasploit's C2 traffic and show that a machine learning-based detector is able to detect the presence of such traffic with high accuracy, even when encrypted. We then outline and implement a set of modifications to the Metasploit framework in order to decrease the detection rates of such classifier. To evaluate the performance of these modifications, we use two threat models with increasing awareness of these modifications. We look at the detection evasion performance and at the byte count and runtime overhead of the modifications. Our results show that for the second, increased-awareness threat model the framework-side traffic modifications yield a better detection avoidance rate (90 that although the modifications use up to 3 times more TLS payload bytes than the original, the runtime does not significantly change and the total number of bytes (including TLS payload) reduces.

READ FULL TEXT
research
09/05/2019

Using Cyber Threat Intelligence to Prevent Malicious Known Traffic in a SDN Physical Testbed

Since the use of applications and communication tools has increased, one...
research
01/31/2023

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis

In this paper, we propose HyperVision, a realtime unsupervised machine l...
research
04/20/2021

Passive, Transparent, and Selective TLS Decryption for Network Security Monitoring

Internet traffic is increasingly encrypted. While this protects the conf...
research
10/18/2018

Deep Learning for Encrypted Traffic Classification: An Overview

Traffic classification has been studied for two decades and applied to a...
research
02/15/2022

Crypto-ransomware detection using machine learning models in file-sharing network scenario with encrypted traffic

Ransomware is considered as a significant threat for most enterprises si...
research
12/12/2020

Increased peak detection accuracy in over-dispersed ChIP-seq data with supervised segmentation models

Motivation: Histone modification constitutes a basic mechanism for the g...
research
12/21/2021

ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

We present ANUBIS, a highly effective machine learning-based APT detecti...

Please sign up or login with your details

Forgot password? Click here to reset