HTTP ANALYSIS
analysts can utilize this analysis method to detect the following attacks that uses http protocol
Phishing pages
Web attacks
Data exfiltration
Command and control traffic (C2)
USER-AGENT ANALYSIS
security analysts shouldn't fully rely on the user-agent field alone to spot an anomaly as adversaries can modify the user-agent data. user-agent anomaly/threat detection/hunting is an additional data source that could be checked and is useful when there is an obvious anomaly. to effectively conduct this type of analysis, threat hunters should validate the anomaly against normal user-agent information such as the user-agent database.

root@dco:~$ wireshark &
#step 1: get an overview
WireShark
Filter: http.user_agent
#step 2: identify typically used adversary user-agent
WireShark
Filter: lower((http.user_agent contains "sqlmap") or (http.user_agent contains "Nmap") or (http.user_agent contains "wfuzz") or (http.user_agent contains "Nikto"))
* be aware that sophisticated APTs or adversaries can modify the user-agent data to match legitimate user-agents used by web browsers

Last updated