System Network Discovery - Linux
Detects enumeration of local network configuration
Sigma rule (View on GitHub)
1title: System Network Discovery - Linux
2id: e7bd1cfa-b446-4c88-8afb-403bcd79e3fa
3status: test
4description: Detects enumeration of local network configuration
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1016/T1016.md
7author: Ömer Günal and remotephone, oscd.community
8date: 2020-10-06
9modified: 2022-09-15
10tags:
11 - attack.discovery
12 - attack.t1016
13logsource:
14 category: process_creation
15 product: linux
16detection:
17 selection_img:
18 Image|endswith:
19 - '/firewall-cmd'
20 - '/ufw'
21 - '/iptables'
22 - '/netstat'
23 - '/ss'
24 - '/ip'
25 - '/ifconfig'
26 - '/systemd-resolve'
27 - '/route'
28 selection_cli:
29 CommandLine|contains: '/etc/resolv.conf'
30 condition: 1 of selection_*
31falsepositives:
32 - Legitimate administration activities
33level: informational
References
Related rules
- Cisco Discovery
- Nltest.EXE Execution
- OpenCanary - SNMP OID Request
- Potential Recon Activity Via Nltest.EXE
- Suspicious Network Command