Common Information
Type Value
Value
Connection Proxy - T1090
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description A connection proxy is used to direct network traffic between systems or act as an intermediary for network communications. Many tools exist that enable traffic redirection through proxies or port redirection, including HTRAN, ZXProxy, and ZXPortMap. (Citation: Trend Micro APT Attack Tools) The definition of a proxy can also be expanded out to encompass trust relationships between networks in peer-to-peer, mesh, or trusted connections between networks consisting of hosts or systems that regularly communicate with each other. The network may be within a single organization or across organizations with trust relationships. Adversaries could use these types of relationships to manage command and control communications, to reduce the number of simultaneous outbound network connections, to provide resiliency in the face of connection loss, or to ride over existing trusted communications paths between victims to avoid suspicion. Detection: Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Network activities disassociated from user-driven actions from processes that normally require user direction are suspicious. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server or between clients that should not or often do not communicate with one another). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious. Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. (Citation: University of Birmingham C2) Platforms: Linux, macOS, Windows Data Sources: Process use of network, Process monitoring, Netflow/Enclave netflow, Packet capture Requires Network: Yes Contributors: Walker Johnson
Details Published Attributes CTI Title
Details Website 2025-01-01 11 Visionaries Have Democratised Remote Network Access – Citrix Virtual Apps and Desktops (CVE Unknown) | CTF导航
Details Website 2024-12-30 27 Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware
Details Website 2024-12-08 2 Exploring Chrome’s CVE-2020-6418 – Part1 — Haboob
Details Website 2024-11-17 1 CVE Explained: Breaking Down the Windows KDC Proxy Vulnerability (CVE-2024–43639)
Details Website 2024-11-17 0 Which Foreign Country is Cheapest to Travel? Top Budget Destinations!
Details Website 2024-11-16 9 Overpass — TryHackMe CTF Walkthrough
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 0 GZR Observer Daily — Nov 16, 2024
Details Website 2024-11-16 0 Understanding Foreign Information Manipulation and Interference (FIMI): A Growing Global Threat
Details Website 2024-11-16 3 Web Fr1da — Pentest Tool for Android
Details Website 2024-11-15 0 BlackArch Linux Tools
Details Website 2024-11-15 0 Web Siteleri ve platform Neden IP Adreslerini Kaydederler ?
Details Website 2024-11-15 14 Insecure Deserialization 2 — DotNetNuke Cookie Zafiyeti
Details Website 2024-11-15 38 BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
Details Website 2024-11-15 38 BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
Details Website 2024-11-15 3 TryHackMe | Firewall Fundamentals | WriteUp
Details Website 2024-11-15 8 Proving Grounds Practice — Flimsy
Details Website 2024-11-15 38 Dark Web Profile: Cadet Blizzard
Details Website 2024-11-15 4 Black Basta Ransomware Leveraging Social Engineering For Malware Deployment
Details Website 2024-11-15 12 Fortifying Your Applications: An Exhaustive Guide to Defending Against Remote Code Execution (RCE)…
Details Website 2024-11-15 8 Earn $5000 After Learning How to Bypass the Rate Limiting for API Bug Hunting .
Details Website 2024-11-15 103 Microsoft's Security Update in November on High-Risk Vulnerabilities in Multiple Products - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
Details Website 2024-11-15 1 Top 5 Malware Network Traffic Analysis Tools 2024.
Details Website 2024-11-15 1 Busting Ransomware’s Billion-Dollar Boom with Network Observability and Security | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-15 5 The Good, the Bad and the Ugly in Cybersecurity - Week 46