Detectionlowtest

Linux Network Service Scanning Tools Execution

Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Alejandro Ortuno, oscd.community, Georg Lauenstein (sure[secure])Created Wed Oct 21Updated Thu Sep 193e102cd9-a70d-4a7a-9508-403963092f31linux
Log Source
LinuxProcess Creation
ProductLinux← raw: linux
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic3 selectors
detection:
    selection_netcat:
        Image|endswith:
            - '/nc'
            - '/ncat'
            - '/netcat'
            - '/socat'
    selection_network_scanning_tools:
        Image|endswith:
            - '/autorecon'
            - '/hping'
            - '/hping2'
            - '/hping3'
            - '/naabu'
            - '/nmap'
            - '/nping'
            - '/telnet' # could be wget, curl, ssh, many things. basically everything that is able to do network connection. consider fine tuning
            - '/zenmap'
    filter_main_netcat_listen_flag:
        CommandLine|contains:
            - ' --listen '
            - ' -l '
    condition: (selection_netcat and not filter_main_netcat_listen_flag) or selection_network_scanning_tools
False Positives

Legitimate administration activities

Rule Metadata
Rule ID
3e102cd9-a70d-4a7a-9508-403963092f31
Status
test
Level
low
Type
Detection
Created
Wed Oct 21
Modified
Thu Sep 19
Path
rules/linux/process_creation/proc_creation_lnx_susp_network_utilities_execution.yml
Raw Tags
attack.discoveryattack.t1046
View on GitHub