Hi, I was reading the 2011-2012 buyers giude. There is a statement that describes Base64 encoded HTTP messages , used in command and control traffic for malware. The bot sets the User-Agent header value to “inter easy” and also receives a scrambledBase64 encoded command which means “sleep”: <!-- 2upczxAX.3 Most network security controls would pass this bot’s traffic withno complaints, as it appears to resemble common Web applicationtraffic. If a firewall was capable of analyzing all HTTP andHTTPS traffic and determine that the traffic was anomalous insome way, either based on behavior patterns of browsing, or theunusual request and response strings or patterns, then this couldpotentially be blocked. However, even most intrusion detectionand prevention devices today would rely on a standard signaturebasedmethod to detect this, and most likely wouldn’t. How does Palo Alto firewalls deal with such traffic ? I guess it would have to rely on signatures itself right ? , But the Botnet detection logic would let you see if these patterns would be going to known malware links? . I am trying to get past markeing and understand how it really works. One more question , If I set up my own websever at home and connected to that on IP address, Will Palo flag that as unusual trafiic ? and where can I see that? and how do I reliably block that ? Thanks , Sunil
... View more