
Summary
This detection rule identifies potential enumeration of local network configurations on Linux systems. By closely monitoring specific networking processes such as "arp," "ifconfig," "ip," "netstat," "firewall-cmd," "ufw," "iptables," "ss," and "route" within a 30-minute timeframe, the rule aims to flag possible reconnaissance activities by adversaries seeking to map out network infrastructures for future exploitation.
The focus on these processes is key, as they are commonly used during network discovery to gather essential details about the network topology, identify active devices, and pinpoint vulnerabilities. If malicious intent is confirmed, such activities can facilitate subsequent attacks or lateral movement within the environment, highlighting the need for prompt detection and response. The implementation of this rule relies on data sourced from Sysmon for Linux, requiring effective configuration of logs and security telemetry from endpoint detection agents. Adjustments to filter out known false positives from legitimate administrative activities are also recommended.
Categories
- Linux
- Endpoint
- Network
- Infrastructure
Data Sources
- Pod
- Container
- User Account
- Script
- Process
- Network Traffic
ATT&CK Techniques
- T1016
Created: 2024-11-13