Detecting TOR traffic
The TOR anonymity network is the perfect place to hide command-and-control, exfiltration, or ransomware payment through bitcoin. You would like to use firewall data to find TOR traffic on your network.
Data required
How to use Splunk software for this use case
Next steps
For more great content from the Splunk Education team, check out Splunk How-To on YouTube or sign up for a course.
In addition, these Splunk resources might help you understand and implement this search:
- Splunk App: Stream
- Splunk Answers: How to detect TOR traffic