Skip to main content

Detection Avoidance

Techniques for minimizing detection signatures on the network and host.

Network Indicators

IndicatorDefaultMitigation
Custom ALPNmuti-metroo/1Set empty string
HTTP headerX-Muti-Metroo-ProtocolSet empty string
WS subprotocolmuti-metroo/1Set empty string
Certificate CNmuti-metrooUse realistic names
Beaconing interval30s keepaliveConfigure keepalive_jitter (default 0.2 = 20%)
Connection burstImmediateStagger peer connections

Keepalive Jitter

Fixed-interval keepalives create detectable beacon patterns. Muti Metroo applies timing jitter to randomize keepalive intervals:

connections:
idle_threshold: 30s # Base keepalive interval
keepalive_jitter: 0.2 # 20% jitter (24-36s range)

Higher jitter values provide better evasion but may affect connection stability:

JitterRange (30s base)Use Case
0.0Fixed 30sTesting only (detectable)
0.224-36sDefault (balanced)
0.321-39sEnhanced evasion
0.515-45sMaximum evasion (may affect stability)

Host Indicators

IndicatorMitigation
Binary nameRename to match environment
Service nameCustomize service installation
Config pathUse realistic system paths
Log filesSet log_level: error, use syslog
Data directoryBlend with system directories

Certificate Considerations

Generate certificates with realistic attributes:

# Generate CA with corporate-like name
muti-metroo cert ca --cn "Internal Services Root CA" -o ./certs

# Generate agent cert matching environment
muti-metroo cert agent --cn "api-gateway-prod-01" \
--ca ./certs/ca.crt \
--ca-key ./certs/ca.key \
-o ./certs

Certificate tips:

  • Match organizational naming conventions
  • Use appropriate validity periods (1 year typical)
  • Consider using legitimate certificates if available
  • Self-signed certs may trigger TLS inspection alerts