TCP Port 8000 Activity to the Internet
TCP Port 8000 is commonly used for development environments of web server software. It generally should not be exposed directly to the Internet. If you are running software like this on the Internet, you should consider placing it behind a reverse proxy.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2020/02/18"
3deprecation_date = "2021/04/15"
4maturity = "deprecated"
5updated_date = "2021/04/15"
6
7[rule]
8author = ["Elastic"]
9description = """
10TCP Port 8000 is commonly used for development environments of web server software. It generally should not be exposed
11directly to the Internet. If you are running software like this on the Internet, you should consider placing it behind a
12reverse proxy.
13"""
14false_positives = [
15 """
16 Because this port is in the ephemeral range, this rule may false under certain conditions, such as when a NATed web
17 server replies to a client which has used a port in the range by coincidence. In this case, such servers can be
18 excluded. Some applications may use this port but this is very uncommon and usually appears in local traffic using
19 private IPs, which this rule does not match. Some cloud environments, particularly development environments, may use
20 this port when VPNs or direct connects are not in use and cloud instances are accessed across the Internet.
21 """,
22]
23from = "now-9m"
24index = ["filebeat-*", "packetbeat-*", "logs-endpoint.events.*"]
25language = "kuery"
26license = "Elastic License v2"
27name = "TCP Port 8000 Activity to the Internet"
28risk_score = 21
29rule_id = "08d5d7e2-740f-44d8-aeda-e41f4263efaf"
30severity = "low"
31tags = ["Elastic", "Host", "Network", "Threat Detection", "Command and Control"]
32timestamp_override = "event.ingested"
33type = "query"
34
35query = '''
36event.category:(network or network_traffic) and network.transport:tcp and destination.port:8000 and
37 source.ip:(
38 10.0.0.0/8 or
39 172.16.0.0/12 or
40 192.168.0.0/16
41 ) and
42 not destination.ip:(
43 10.0.0.0/8 or
44 127.0.0.0/8 or
45 169.254.0.0/16 or
46 172.16.0.0/12 or
47 192.168.0.0/16 or
48 224.0.0.0/4 or
49 "::1" or
50 "FE80::/10" or
51 "FF00::/8"
52 )
53'''
54
55
56[[rule.threat]]
57framework = "MITRE ATT&CK"
58
59[rule.threat.tactic]
60id = "TA0011"
61name = "Command and Control"
62reference = "https://attack.mitre.org/tactics/TA0011/"
Related rules
- FTP (File Transfer Protocol) Activity to the Internet
- IRC (Internet Relay Chat) Protocol Activity to the Internet
- PPTP (Point to Point Tunneling Protocol) Activity
- Proxy Port Activity to the Internet
- SMTP to the Internet