traffic. For example, "C:\Windows\System32" has become a common trigger for investigation.
Some defenders have even gone the extra mile in legitimizing a potential threat. Assume the defenders or IT staff uses a remote administration tool regularly.
Ignoring recommendations, this traffic is unencrypted. Rather than causing an alert each time the tool is used legitimately the alert is configured to look for inconsistencies in the usage. For example, most attackers are accustomed to typing lowercase commands in Windows. The defender ignores "C:\Windows\System32" but alerts on "c:\windows\system32"
Internal encryption is another example of where peers should be consulted to determine the best course of action before deploying C further into a network.
The encryption of internal C traffic depends upon several different factors:
Are there sensors inside the network?
Are there other encrypted communications occurring between target systems?
Would encrypted traffic standout more than unencrypted traffic?
Share with your friends: