heroui logo

System Network Discovery - macOS

Sigma Rules

View Source
Summary
This detection rule for macOS identifies potential network configuration enumeration attempts by examining process creation events. It specifically focuses on common network command-line tools and system files. The analysis includes two primary selections: the first observes the execution of network utility commands such as '/arp', '/ifconfig', '/netstat', '/networksetup', and '/socketfilterfw', while the second selection targets the utilization of the '/usr/bin/defaults' command to read the Application Layer Firewall preferences, indicated by the command line containing specific strings. The detection condition is met when any of the first selection occurs without the presence of processes that are spawned by 'wifivelocityd', which may indicate legitimate activity. The rule is intended to flag suspicious network discovery operations while allowing for benign administrative actions, minimizing false positives.
Categories
  • macOS
  • Network
  • Endpoint
Data Sources
  • Process
ATT&CK Techniques
  • T1016
Created: 2020-10-06