C2 Detection - Command & Carol Tryhackme
Learn C2 detection using RITA (Real Intelligence Threat Analytics) on TryHackMe Advent of Cyber 2025 Day 22. Convert PCAP to Zeek logs, hunt command & control traffic, analyze beaconing patterns, DNS tunneling & threat intel analytics. Perfect for network security & threat hunting.
COMMAND AND CONTROL FRAMEWORKREAL INTELLIGENCE THREAT ANALYTICSC2 SERVEROFFENSIVE SECURITYADVENT OF CYBER 2025METHODOLOGYRABBITHOLETRYHACKME WRITEUPSCTFTRYHACKME WALKTHROUGHCYBERSECURITY CHALLENGESTRYHACKME ROOM SOLUTIONSTRYHACKME ANSWERSSOC AND SIEM LABSZEEKCYBERSECURITY LABSBLUE TEAM TRAININGCYBERSECURITYETHICAL HACKINGTRYHACKMEOPEN-SOURCE TOOLSGITHUB
Jawstar
12/21/20252 min read


Task 1 : Introduction
Learning Objectives
Convert a PCAP to Zeek logs
Use RITA to analyze Zeek logs
Analyze the output of RITA

Task 2 : Detecting C2 with RITA
The Magic of RITA
Real Intelligence Threat Analytics (RITA) is an open-source framework created by Active Countermeasures. Its core functionality is to detect command and control (C2) communication by analyzing network traffic captures and logs. Its primary features are:
C2 beacon detection
DNS tunneling detection
Long connection detection
Data exfiltration detection
Checking threat intel feeds
Score connections by severity
Show the number of hosts communicating with a specific external IP
Shows the datetime when the external host was first seen on the network
The magic behind RITA is its analytics. It correlates several captured fields, including IP addresses, ports, timestamps, and connection durations, among others. Based on the normalized and correlated dataset, RITA runs several analysis modules collecting information like:
Periodic connection intervals
Excessive number of DNS queries
Long FQDN
Random subdomains
Volume of data over time over HTTPS, DNS, or non-standard ports
Self-signed or short-lived certificates
Known malicious IPs by cross-referencing with public threat intel feeds or blocklists
RITA only accepts network traffic input as Zeek logs. Zeek is an open-source network security monitoring (NSM) tool. Zeek is not a firewall or IPS/IDS; it does not use signatures or specific rules to take an action. It simply observes network traffic via configured SPAN ports (used to copy traffic from one port to another for monitoring), physical network taps, or imported packet captures in the PCAP format. Zeek then analyzes and converts this input into a structured, enriched output. This output can be used in incident detection and response, as well as threat hunting. Out of the box, Zeek covers two of the four types of NSM data: transaction data (summarized records of application-layer transactions) and extracted content data (files or artifacts extracted, such as executables).
Github Link : https://github.com/activecm/rita
Answer the questions below
How many hosts are communicating with malhare.net?
6
Which Threat Modifier tells us the number of hosts communicating to a certain destination?
prevalence
What is the highest number of connections to rabbithole.malhare.net?
40
Which search filter would you use to search for all entries that communicate to rabbithole.malhare.net with a beacon score greater than 70% and sorted by connection duration (descending)? dst:rabbithole.malhare.net beacon:>=70 sort:duration-desc
Which port did the host 10.0.0.13 use to connect to rabbithole.malhare.net?
80
🔐 Conclusion
Detecting C2 traffic with RITA is a critical skill every SOC analyst, threat hunter, and blue teamer must master in today’s evolving threat landscape. This TryHackMe room doesn’t just teach tools—it sharpens the mindset required to uncover stealthy attacker communications hiding in plain sight.
If you found this lab valuable, imagine going deeper with real-world attack breakdowns, step-by-step threat hunting guides, OSINT workflows, and advanced cybersecurity write-ups—all in one place.
👉 Subscribe to jawstarsec.in and stay ahead of attackers with practical, no-fluff cybersecurity content crafted for learners who want to become professionals.
Learn smart. Hunt threats. Stay dangerous (ethically). 🚀🛡️
Connect
Secure your future with expert cybersecurity solutions
Support
Quick Links
© 2025. All rights reserved.
contact@jawstarsec.in
