Skip to main content
T1572Command and Controlhard difficulty

Protocol Tunneling

Protocol Tunneling (T1572) is a MITRE ATT&CK technique in the Command and Control tactic. SOC analysts detect it by monitoring for Firewall, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

FirewallSIEM

What is Protocol Tunneling?

Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection and network filtering. Tunneling involves explicitly encapsulating a network protocol within another. This behavior may conceal malicious traffic by blending it in with existing traffic and/or provide an outer layer of encryption. Tunneling may be used by adversaries in conjunction with proxy use, which can obfuscate traffic by requiring it to pass through a third system. Common tunneling techniques include SSH tunneling to bypass network controls, DNS tunneling for covert data exfiltration and command receipt, ICMP tunneling, and using protocols like HTTP, HTTPS, and WebSocket to encapsulate other protocols within allowed traffic. Protocol tunneling is particularly effective in environments where egress filtering blocks direct connections but allows common protocols like DNS and HTTPS.

Protocol Tunneling is documented as technique T1572 in the MITRE ATT&CK knowledge base under the Command and Control tactic. Detection requires visibility into Firewall, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Protocol Tunneling activity. These methods apply across Firewall, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor DNS traffic for volume anomalies and subdomain length distributions, as DNS tunneling generates significantly higher query volumes and longer subdomain strings than normal DNS usage patterns.

  2. 2

    Detect ICMP tunneling by monitoring ICMP packet sizes and payloads, as legitimate ICMP ping traffic has predictable small payloads while ICMP tunneling tools use maximum-size ICMP packets with encoded data.

  3. 3

    Alert on SSH connections from servers and workstations that should not be creating outbound SSH sessions, particularly when the SSH port is 22 on non-standard server ranges indicating masquerading as legitimate SSH.

  4. 4

    Monitor for protocol anomalies in allowed traffic flows, including HTTP requests with abnormally large headers, unusually high-frequency keep-alive connections, and WebSocket connections with consistent binary payload patterns.

  5. 5

    Analyze outbound traffic for signs of data encapsulation including base64-encoded content in protocol fields not designed to carry data, non-standard use of protocol features, and statistical anomalies in traffic patterns.

Example Alerts

These realistic alert examples show what Protocol Tunneling looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

CriticalFirewall

DNS Tunneling Data Exfiltration Detected

DNS tunneling detected from internal server 10.0.5.234: generating 2,400 DNS TXT record queries per hour to subdomains of cdn-resource.net with base64-encoded subdomain labels averaging 58 characters. Total data throughput estimated at 1.2MB/hour over DNS. Traditional DNS queries from this server average 200 per hour with short hostnames. Pattern matches iodine or dnscat2 DNS tunneling tools.

HighFirewall

ICMP Tunnel Communication

Network monitoring detected ICMP echo request/reply traffic between internal workstation 192.168.12.45 and external IP 185.220.101.88 with payload sizes of 1440 bytes (maximum ICMP payload). Normal ping traffic uses 32-64 byte payloads. The traffic has been ongoing for 6 hours at 200 packets per minute. This pattern is characteristic of ICMP tunneling tools used for covert command-and-control communication.

HighFirewall

SSH Tunnel Established from Workstation

SSH connection established from finance workstation FIN-WS-011 to external server on port 22 with persistent connection maintained for 4 hours. Local port forwarding configuration detected tunneling internal network traffic through the SSH connection. The destination server is hosted on a commercial VPS provider and the workstation user has no legitimate reason to establish SSH tunnels to external infrastructure.

Practice Detecting Protocol Tunneling

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Protocol Tunneling. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Protocol Tunneling?
SOC analysts detect Protocol Tunneling (T1572) by monitoring Firewall, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor dns traffic for volume anomalies and subdomain length distributions, as dns tunneling generates significantly higher query volumes and longer . SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Protocol Tunneling?
Protocol Tunneling can be detected using Firewall, SIEM platforms. Firewall tools are particularly effective for this technique because they provide visibility into the command and control phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Protocol Tunneling in real-world attacks?
Protocol Tunneling is a well-documented MITRE ATT&CK technique in the Command and Control tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Protocol Tunneling scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Protocol Tunneling for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Command and Control techniques like Protocol Tunneling. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Command and Control? — SOC Glossary

Command and Control (C2) refers to the infrastructure and communication channels adversaries use to remotely direct malw…

Read more
Glossary

What is NDR? — SOC Glossary

Network Detection and Response (NDR) is a security platform that passively monitors network traffic using machine learni…

Read more
Glossary

What is IOC? — SOC Glossary

An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Career Path

Threat Hunter Career Guide — Salary & Skills

Threat Hunters do not wait for alerts. You develop hypotheses based on threat intelligence and adversary behavior models…

Read more
Tool

Firewall Training Console — SOCSimulator

The Firewall console in SOCSimulator replicates the log analysis experience of enterprise platforms like Palo Alto Netwo…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Command and Control (C2) Traffic Investigation — Investigation Playbook

When network monitoring detects periodic outbound connections to suspicious external hosts, unusual DNS patterns, or tra…

Read more
Playbook

DNS Tunneling Investigation — Investigation Playbook

When DNS monitoring detects anomalous query patterns, high-entropy subdomains, unusually long query strings, excessive T…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more

We use cookies to improve your experience and measure usage. Learn more