heroui logo

Linux Auditd System Network Configuration Discovery

Splunk Security Content

View Source
Summary
The Linux Auditd System Network Configuration Discovery detection rule identifies suspicious activities related to system network configuration, which may suggest reconnaissance efforts by an adversary to gather information about the network. By monitoring specific commands such as 'ifconfig', 'ip', 'netstat', and others, the rule can detect unusual patterns in network discovery attempts that could precede malicious actions like lateral movement or data exfiltration. This detection is implemented by ingesting auditd syscall data and analyzing the execution of multiple network discovery commands within a specified timeframe. The implementation of this rule aids security personnel in promptly identifying and mitigating potential threats to network integrity.
Categories
  • Linux
  • Endpoint
Data Sources
  • Kernel
  • Process
  • Logon Session
ATT&CK Techniques
  • T1016
Created: 2024-11-13