Linux Network Service Scanning Tools Execution

Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.

Sigma rule (View on GitHub)

 1title: Linux Network Service Scanning Tools Execution
 2id: 3e102cd9-a70d-4a7a-9508-403963092f31
 3status: test
 4description: Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.
 5references:
 6    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md
 7    - https://github.com/projectdiscovery/naabu
 8    - https://github.com/Tib3rius/AutoRecon
 9author: Alejandro Ortuno, oscd.community, Georg Lauenstein (sure[secure])
10date: 2020/10/21
11modified: 2023/10/25
12tags:
13    - attack.discovery
14    - attack.t1046
15logsource:
16    category: process_creation
17    product: linux
18detection:
19    selection_netcat:
20        Image|endswith:
21            - '/nc'
22            - '/ncat'
23            - '/netcat'
24            - '/socat'
25    selection_network_scanning_tools:
26        Image|endswith:
27            - '/autorecon'
28            - '/hping'
29            - '/hping2'
30            - '/hping3'
31            - '/naabu'
32            - '/nmap'
33            - '/nping'
34            - '/telnet' # could be wget, curl, ssh, many things. basically everything that is able to do network connection. consider fine tuning
35    filter_main_netcat_listen_flag:
36        CommandLine|contains:
37            - ' --listen '
38            - ' -l '
39    condition: (selection_netcat and not filter_main_netcat_listen_flag) or selection_network_scanning_tools
40falsepositives:
41    - Legitimate administration activities
42level: low

References

Related rules

to-top