• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Metasploit C&C TLS Connection

Risk Factors

Metasploit is a well-known attack tool for generating exploit code and handling command-and-control (C&C) communication. Default settings in Metasploit facilitate attacks for less-experienced or less-skilled attackers. Through a persistent C&C channel, an attacker can remotely control a device and gain an entry point for further attacks on the network.

Kill Chain

Command-and-Control

Risk Score

60

Detection diagram
Next in Command-and-Control: Mythic C&C HTTP Connection

Attack Background

The Metasploit Framework includes several modules for generating payloads with exploit code. The most common payload type is the Meterpreter payload, which helps manage C&C channels. The Meterpreter payload is delivered to the victim through a successful exploit. A self-signed TLS certificate for the C&C server is generated by the Metasploit module, and the payload on the victim initiates a TLS connection with the C&C server. A Meterpreter session is then opened, enabling the attacker to run commands on the victim.

Mitigation Options

Apply system updates regularly to reduce the number of vulnerabilities that can be exploited

Quarantine the client while checking for indicators of compromise

Block inbound and outbound traffic from suspicious hosts at the network perimeter

Implement network segmentation and the principle of least privilege on accounts to minimize the damage caused by a compromised device

MITRE ATT&CK ID

What else can RevealX do for you?