Skip to content
View faanross's full-sized avatar

Block or report faanross

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
faanross/README.md

hi.

I'm a security researcher at Active Countermeasures that ponders one specific question: how to detect C2 malware.

While most tackle this problem by looking at the endpoint, my interest lies in taking a network threat hunting approach.

Why? Because all applications stand naked before the Network Gods. That's my pretentious way of saying that on the network, there's nowhere to hide. The issue isn't whether it's there, but rather how to find it buried inside of the chaotic deluge of legitimate traffic.

In the quest to become hopefully somewhat competent at this I like tackling the challenge from both angles.

Donning my defensive hat I think about ways to tease out C2/RAT communication by taking a statistical + fingerprinting approach to analyze network traffic. Though the specifics differ depending on the exact question I'm asking, the common thread almost always involves the use of Zeek + custom Python tooling.

And to better understand exactly how C2 communicates, as well as how it could still potentially communicate, I develop C2 emulation tools, mostly in Go and .NET.

If you have any questions or feedback, feel free to connect with me - [email protected].

Live long and prosper.

Faan


“If you wish to make an apple pie from scratch, you must first invent the universe.” – Carl Sagan

Popular repositories Loading

  1. Python-Cybersecurity-for-Beginners-YT-Series- Python-Cybersecurity-for-Beginners-YT-Series- Public

    Python Cybersecurity for Beginners (YT Series)

    Python 17 9

  2. payloads_mastery payloads_mastery Public

    all code related to my youtube series on C# payloads

    C# 7 2

  3. faanross.github.io faanross.github.io Public

    HTML 1

  4. Merlin_QUIC_Fingerprint Merlin_QUIC_Fingerprint Public

    A Python script that analyzes Zeek QUIC logs to detect potential Merlin C2 fingerprints.

    Python

  5. RCR_payload_jitter RCR_payload_jitter Public

    A Python script that uses a custom statistical measure Range Coverage Ratio (RCR) to determine the use of payload/data jitter in a C2 agent

    HTML

  6. faanross faanross Public