Find DGA, DNS, and ICMP tunneling
Is an attacker remotely controlling assets on your network? Corelight’s C2 Collection has the answers with over 50 unique insights and detections that illuminate command and control activity. Battle-tested by some of the world’s most sophisticated organizations, this collection covers known C2 toolkits and MITRE ATT&CK® C2 techniques to find novel attacks. Read about how to detect the Manjusaka C2 framework.
Corelight Collections are detection sets included with your Corelight subscription and can be activated depending on your needs.
- Catch attacker tunnels camouflaged as normal traffic
- Find Cobalt Strike, Empire, Metasploit, and other common tools
- 50+ unique C2 detections and insights that enhance MITRE ATT&CK coverage
Detections
HTTP C2
DNS tunneling
ICMP tunneling
Domain generation algorithms (DGAs)
Meterpreter
And more...
How it works
The C2 Collection offers over 50 insights and detections into HTTP C2 communications including tunneling and domain generation algorithms. It employs Zeek® to analyze behavioral characteristics of network traffic, and integrates the results into Corelight’s comprehensive suite of evidence and analytics.