论文标题
调整Metasploit以逃避加密的C2流量检测
Tweaking Metasploit to Evade Encrypted C2 Traffic Detection
论文作者
论文摘要
命令和控制(C2)通信是任何结构化网络攻击的关键组成部分。因此,安全操作积极尝试检测其网络中的这种通信。这给试图保持未被发现的合法申请人带来了一个问题,因为通常使用的pentesting工具(例如Metasploit)生成了恒定的流量模式,这些流量模式易于与常规的网络流量区分开。在本文中,我们从Metasploit的C2流量中的这些可识别的模式开始,并表明基于机器学习的检测器即使加密也能够以很高的精度检测到这种流量的存在。然后,我们概述并对元跨框架进行了一组修改,以降低该分类器的检测率。为了评估这些修改的性能,我们使用两个威胁模型,对这些修改的认识越来越多。我们查看逃避性能以及修改的字节数和运行时开销。我们的结果表明,在第二个增强的意识威胁模型中,框架侧交通修改比仅有效载荷方更高的检测回避率(90%)更好(50%)。我们还表明,尽管修改使用的TLS有效载荷比原始时间高3倍,但运行时没有显着更改,并且总字节总数(包括TLS有效载荷)减少。
Command and Control (C2) communication is a key component of any structured cyber-attack. As such, security operations actively try to detect this type of communication in their networks. This poses a problem for legitimate pentesters that try to remain undetected, since commonly used pentesting tools, such as Metasploit, generate constant traffic patterns that are easily distinguishable from regular web traffic. In this paper we start with these identifiable patterns in Metasploit's C2 traffic and show that a machine learning-based detector is able to detect the presence of such traffic with high accuracy, even when encrypted. We then outline and implement a set of modifications to the Metasploit framework in order to decrease the detection rates of such classifier. To evaluate the performance of these modifications, we use two threat models with increasing awareness of these modifications. We look at the detection evasion performance and at the byte count and runtime overhead of the modifications. Our results show that for the second, increased-awareness threat model the framework-side traffic modifications yield a better detection avoidance rate (90%) than payload-side only modifications (50%). We also show that although the modifications use up to 3 times more TLS payload bytes than the original, the runtime does not significantly change and the total number of bytes (including TLS payload) reduces.