HTTP ANALYSIS
Last updated
Last updated
analysts can utilize this analysis method to detect the following attacks that uses http protocol
Phishing pages
Web attacks
Data exfiltration
Command and control traffic (C2)
security analysts shouldn't fully rely on the user-agent field alone to spot an anomaly as adversaries can modify the user-agent data. user-agent anomaly/threat detection/hunting is an additional data source that could be checked and is useful when there is an obvious anomaly. to effectively conduct this type of analysis, threat hunters should validate the anomaly against normal user-agent information such as the .