Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >ATTACK
  3. >Command And Control
  4. >ATTACK-T1572
ATTACK-T1572Active

Protocol Tunneling

Statement

Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. Tunneling involves explicitly encapsulating a protocol within another. This behavior may conceal malicious traffic by blending in with existing traffic and/or provide an outer layer of encryption (similar to a VPN). Tunneling could also enable routing of network packets that would otherwise not reach their intended destination, such as SMB, RDP, or other traffic that would be filtered by network appliances or not routed over the Internet.

There are various means to encapsulate a protocol within another protocol. For example, adversaries may perform SSH tunneling (also known as SSH port forwarding), which involves forwarding arbitrary data over an encrypted SSH tunnel.(Citation: SSH Tunneling)(Citation: Sygnia Abyss Locker 2025)

Protocol Tunneling may also be abused by adversaries during Dynamic Resolution. Known as DNS over HTTPS (DoH), queries to resolve C2 infrastructure may be encapsulated within encrypted HTTPS packets.(Citation: BleepingComp Godlua JUL19)

Adversaries may also leverage Protocol Tunneling in conjunction with Proxy and/or Protocol or Service Impersonation to further conceal C2 communications and infrastructure.

Location

Tactic
Command and Control

Technique Details

Identifier
ATTACK-T1572
ATT&CK Page
View on MITRE

Tactics

Command And Control

Platforms

ESXiLinuxmacOSWindows

Detection

Detection Strategy for Protocol Tunneling accross OS platforms.

Mitigations

Filter Network Traffic: Employ network appliances and endpoint software to filter ingress, egress, and lateral network traffic. This includes protocol-based filtering, enforcing firewall rules, and blocking or restricting traffic based on predefined conditions to limit adversary movement and data exfiltration. This mitigation can be implemented through the following measures:

Ingress Traffic Filtering:

  • Use Case: Configure network firewalls to allow traffic only from authorized IP addresses to public-facing servers.
  • Implementation: Limit SSH (port 22) and RDP (port 3389) traffic to specific IP ranges.

Egress Traffic Filtering:

  • Use Case: Use firewalls or endpoint security software to block unauthorized outbound traffic to prevent data exfiltration and command-and-control (C2) communications.
  • Implementation: Block outbound traffic to known malicious IPs or regions where communication is unexpected.

Protocol-Based Filtering:

  • Use Case: Restrict the use of specific protocols that are commonly abused by adversaries, such as SMB, RPC, or Telnet, based on business needs.
  • Implementation: Disable SMBv1 on endpoints to prevent exploits like EternalBlue.

Network Segmentation:

  • Use Case: Create network segments for critical systems and restrict communication between segments unless explicitly authorized.
  • Implementation: Implement VLANs to isolate IoT devices or guest networks from core business systems.

Application Layer Filtering:

  • Use Case: Use proxy servers or Web Application Firewalls (WAFs) to inspect and block malicious HTTP/S traffic.
  • Implementation: Configure a WAF to block SQL injection attempts or other web application exploitation techniques.

Network Intrusion Prevention: Use intrusion detection signatures to block traffic at network boundaries.

SP 800-53
SP800-53-AC-3relatedvia ctid-attack-to-sp800-53
SP800-53-AC-4relatedvia ctid-attack-to-sp800-53
SP800-53-CA-7relatedvia ctid-attack-to-sp800-53
SP800-53-CM-2relatedvia ctid-attack-to-sp800-53
SP800-53-CM-6relatedvia ctid-attack-to-sp800-53
View in graphReport an issue
← Back to Command and Control
Command and Control41 controls
ATTACK-T1001Data ObfuscationATTACK-T1001.001Junk DataATTACK-T1001.002SteganographyATTACK-T1001.003Protocol or Service ImpersonationATTACK-T1008Fallback ChannelsATTACK-T1071Application Layer ProtocolATTACK-T1071.001Web ProtocolsATTACK-T1071.002File Transfer ProtocolsATTACK-T1071.003Mail ProtocolsATTACK-T1071.004DNSATTACK-T1071.005Publish/Subscribe ProtocolsATTACK-T1090ProxyATTACK-T1090.001Internal ProxyATTACK-T1090.002External ProxyATTACK-T1090.003Multi-hop ProxyATTACK-T1090.004Domain FrontingATTACK-T1092Communication Through Removable MediaATTACK-T1095Non-Application Layer ProtocolATTACK-T1102Web ServiceATTACK-T1102.001Dead Drop ResolverATTACK-T1102.002Bidirectional CommunicationATTACK-T1102.003One-Way CommunicationATTACK-T1104Multi-Stage ChannelsATTACK-T1105Ingress Tool TransferATTACK-T1132Data EncodingATTACK-T1132.001Standard EncodingATTACK-T1132.002Non-Standard EncodingATTACK-T1219Remote Access ToolsATTACK-T1219.001IDE TunnelingATTACK-T1219.002Remote Desktop SoftwareATTACK-T1219.003Remote Access HardwareATTACK-T1568Dynamic ResolutionATTACK-T1568.001Fast Flux DNSATTACK-T1568.002Domain Generation AlgorithmsATTACK-T1568.003DNS CalculationATTACK-T1571Non-Standard PortATTACK-T1572Protocol TunnelingATTACK-T1573Encrypted ChannelATTACK-T1573.001Symmetric CryptographyATTACK-T1573.002Asymmetric CryptographyATTACK-T1665Hide Infrastructure