heroui logo

Macos Remote System Discovery

Sigma Rules

View Source
Summary
This detection rule is designed to identify activities on macOS systems that involve the enumeration of remote systems, which is a common tactic used by attackers to discover and exploit networked systems. The rule focuses on the process creation events that involve specific command-line tools, namely 'arp' and 'ping'. For the 'arp' command, the detection is triggered if the command line ends with '/arp' and contains the argument '-a'. For the 'ping' command, it will trigger if the command line ends with '/ping' and contains any of the specified IP address patterns, including those commonly used for private and link-local addresses. The detection mechanism uses selections where either one of the conditions related to the 'arp' or 'ping' tool must be met to proceed. This can help security teams detect potential reconnaissance activities by adversaries looking to map out systems in a network. The detection level is classified as 'informational', indicating that while it may highlight legitimate scanning activities, low-level monitoring is still warranted, especially in environments where remote discovery activities should be scrutinized.
Categories
  • macOS
  • Network
Data Sources
  • Process
ATT&CK Techniques
  • T1018
Created: 2020-10-22