Skip to content

Detecting covert HTTPS beaconing from an internal host using network triage methods including firewall alerts, NetFlow analysis, and domain reputation tools.

License

Notifications You must be signed in to change notification settings

Compcode1/beaconing-detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Beaconing Detection: Network Triage Case Study

Overview

This project presents a structured network-based triage case study focused on detecting covert command-and-control (C2) beaconing activity from an internal host. Using a multi-layered approach, the case demonstrates how firewall alerts, NetFlow logs, and log correlation can reveal stealthy outbound traffic indicative of early-stage intrusion, even in the absence of traditional malware artifacts.

Scenario Summary

An alert was generated by the organization's next-generation firewall (NGFW) for repeated HTTPS connections to an unrecognized external domain. The internal host, located in the engineering subnet, showed beaconing behavior with precise 15-second intervals — a hallmark of automated C2 communication. No active user session was present, and no endpoint detection telemetry was available.

Triage Framework Used

Network-Based Triage Protocol, including:

  • Step 1: Nmap Scan Review – to identify unexpected services on the source host.
  • Step 2: Windows Event Log Analysis – to cross-check authentication activity, service creation, and process launches.
  • Step 3: NetFlow Pattern Inspection – to validate repetitive traffic patterns and correlate with other endpoints.

System Anatomy Involved

  • Firewall Layer – NGFW provided the first detection.
  • NetFlow Collection Layer – revealed periodic beaconing activity.
  • Host Visibility Layer – lacked EDR but enabled partial log review.
  • Resolution Layer – escalation to host triage confirmed PowerShell-based persistence.

Outcome

The outbound C2 domain was identified, reputation-checked, and blocked. The affected host was isolated, and a host-level investigation revealed unauthorized service creation and PowerShell script staging. Although no malware was dropped, credential access was attempted.

Key Takeaways

  • NGFW alerts, when paired with NetFlow pattern recognition, are powerful for detecting fileless attacks.
  • Early containment depends on correlating logs across systems before endpoint compromise deepens.
  • Repetitive outbound connections to low-reputation domains should always trigger escalation.

Author

Steven Tuschman
GitHub: Compcode1


About

Detecting covert HTTPS beaconing from an internal host using network triage methods including firewall alerts, NetFlow analysis, and domain reputation tools.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published