Question 5 of 10Pro Only
As encryption becomes ubiquitous, how do you hunt for threats when you cannot inspect the content of network traffic? What metadata and behavioral indicators remain useful?
Sample answer preview
The widespread adoption of TLS encryption is excellent for privacy and security but creates significant challenges for threat hunters who can no longer inspect traffic content for malicious payloads, command strings, or exfiltrated data.
JA3 fingerprintingcertificate analysisencrypted trafficflow analysisbeaconing detectionDNS analysis