<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

Uncovered: Detecting Misconfigured Web Server via Unstructured Hunting in Clear NDR

The following example is of an unstructured hunt technique—an investigation based on an idea or hypothesis derived from previous experience and knowledge. In the screenshot below, we initiated a hunt based on the assumption that there is a misconfigured web server being used by internal hosts or provided as a service within the organization. 

During this investigation, we discovered unauthorized access to a “root” folder, a critical security risk. This type of exposure is dangerous because it can provide malware or intruders with unnecessary access, leak sensitive information, and potentially be exploited for further attacks.

About this blog series:


This blog series explores the benefits of Clear NDRTM, focusing on how its multi-layered detection reduces the total cost of ownership while delivering unparalleled visibility.

Each article in the series highlights real-world examples from an actual Clear NDR deployment, demonstrating how its insights and threat detection capabilities benefited multiple teams across an organization—including Compliance, Security, and Network teams. Through a combination of automation, AI, and customization, Clear NDR provides actionable intelligence backed by strong evidence, enabling faster Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).

No single detection algorithm is perfect. Every approach has strengths and weaknesses, excelling in certain areas while others fall short. That’s why Clear NDR takes a multi-layered detection approach, ensuring that no single method is solely responsible for uncovering threats.

The teams involved in the use cases shared in this blog series benefited from the data, visibility, and evidence that Clear NDR provided, enabling them to take remedial actions against policy violations, Zero Trust architecture gaps, misconfigurations, and other security risks. Ultimately, this led to reduced threat exposure and improved security posture.


Gathering the Complete Body of Evidence

With a single click, we can open the relevant detection event and immediately access all necessary evidence, including:

  • Supporting file data
  • Protocol and flow logs
  • PCAP of the transactions
  • Detection logic that triggered the alert

This level of immediate visibility enables security teams to quickly assess the situation, determine the extent of the risk, and take appropriate remediation actions before an incident escalates.

The Role of PCAP in Incident Response

In many cases, security analysts need to review the specific PCAP as the ultimate source of network evidence for a communication event. This is often necessary to gain deeper insights into who or what is responsible for the unexpected activity, as well as to uncover additional details relevant to incident response. Examining the full packet capture helps analysts identify Indicators of Compromise (IoCs), understand the exact nature of the activity, and determine the appropriate next steps for remediation.

As shown in the screenshot below, this information is readily available with a single click—or through a REST API call if integrated with a SIEM or SOAR platform—providing immediate access to the full transaction PCAP for further investigation.

Analyzing the Root Cause

In the screenshot below, we see a fully reconstructed session from the PCAP, revealing the misconfigured application and the actions attempted against it. This level of detail allows security analysts to determine the next steps for remediation and assess the potential damage or malicious intent behind the activity. The evidence confirms that access to the “root” folder would be granted if the correct credentials were provided—a critical security risk.

With just a few clicks, Clear NDR enables security professionals to quickly validate whether a detection or escalation event is a true or false positive. This drastically reduces investigation time, allowing teams to reach conclusions in a fraction of the time it would take with traditional methods. By providing comprehensive evidence upfront, including packet captures, detection logic, and flow data, Clear NDR eliminates the black-box effect often associated with vendor secrecy and lack of transparency in detection logic.

Conclusion

Clear NDR is a powerful tool for identifying and addressing misconfigured web servers before they become a security risk. By offering detailed visibility into network traffic and contextual insights, it enables security teams to quickly uncover vulnerabilities, such as unauthorized access to critical directories like the “root” folder. With its seamless ability to link detection events to supporting logs, transaction captures, and detection logic, Clear NDR removes the uncertainty and black-box effect often associated with traditional security solutions.

This level of transparency, combined with fast, data-driven decision-making, empowers teams to act rapidly—confirming whether an incident is a legitimate threat or a false positive—and take corrective action to mitigate risks. Ultimately, Clear NDR helps ensure that security teams can identify misconfigurations efficiently, reducing exposure and reinforcing the overall security posture of the organization.

More Real-World Examples

This is just one example of how Clear NDR delivers precise and transparent evidence-backed threat detection. Stay tuned for the next blog in this series, where we’ll dive into another real-world security scenario and how Clear NDR made a difference.

For those organizations wondering if adding NDR to their security strategy is the right choice, the most effective way to discover that answer is by engaging in a POV with the experts at Stamus Networks.

To determine if NDR is right for your organization, use the button below to book a demo and speak to our team. We would love to hear about your network and see how Clear NDR can help. To stay updated with new blog posts and other news from Stamus Networks, make sure to subscribe to the Stamus Networks blog, follow us on Twitter, LinkedIn, and Facebook, or join our Discord (links below).

Peter Manev

Peter Manev is the co-founder and chief strategy officer (CSO) at Stamus Networks. He is a member of the executive team at Open Network Security Foundation (OISF). Peter has over 15 years of experience in the IT industry, including enterprise-level IT security practice. He is a passionate user, developer, and explorer of innovative open-source security software, and he is responsible for training as well as quality assurance and testing on the development team of Suricata – the open-source threat detection engine. Peter is a regular speaker and educator on open-source security, threat hunting, and network security at conferences and live-fire cyber exercises, such as Crossed Swords, DeepSec, Troopers, DefCon, RSA, Suricon, SharkFest, and others. Peter resides in Gothenburg, Sweden.

Schedule a Demo of Clear NDR

REQUEST A DEMO

Related posts

Uncovered: Suspicious TLS Beaconing Activity Uncovered by Clear NDR AI

One of the key strengths of Clear NDRTM is its AI-based TLS beacon detection, which, when combined...

The Hidden Costs of Anomaly-Only Detection & Response Systems

In recent years, AI-based anomaly detection has become a cornerstone of network security marketing....

High-Fidelity Events: How Clear NDR Eliminates Alert Fatigue and Extensive Tuning

For security teams using Darktrace and similar anomaly-based NDR solutions, the scenario is all too...