ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

HTTP Tunnel

Risk Factors

Exchanging data between a victim and a command-and-control (C&C) server through an HTTP tunnel is a common technique that can be easily performed through several tools. HTTP tunnels can help an attacker maintain contact with a compromised device while evading intrusion detection systems.

Category

Command-and-Control
Detection diagram
Next in Command-and-Control: Havoc C&C Beaconing

Attack Background

A web proxy routes requests from an HTTP client to a different server.
An attacker can leverage a web proxy to establish an HTTP tunnel that encrypts communication between a compromised device and an attacker-controlled C&C server, or to access non-HTTP data on an otherwise inaccessible device. First, the attacker sends an HTTP request that includes the CONNECT method to a web server, establishing a persistent HTTP connection. The session is often, but not always, established over SSL/TLS. Next, the client and C&C server can exchange non-HTTP traffic (such as commands or data) through the tunnel.

Legitimate use cases for the HTTP Connect method include securing, monitoring, and managing north-south traffic through a web proxy. This legitimate activity can appear similar to C&C activity.

Mitigation Options

Disable the CONNECT method on web servers

MITRE ATT&CK ID

Associated content

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.

Report

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response — ExtraHop

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections

Visit this resource for more information.

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access — ExtraHop

This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.

Blog

ExtraHop RevealX MITRE ATT&CK Coverage 2024 — ExtraHop

Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.

Blog

MITRE ATT&CK - Network Detection & Response with RevealX — ExtraHop

Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.

External
Periodic Table of Use Cases

What else can RevealX do for you?