
Summary
This detection rule is designed to audit network service enumeration activities on Linux systems using the Audit daemon (auditd). Specifically, it captures Syscall events related to certain network scanning tools - namely, telnet, nmap, netcat, and their variants. The rule focuses on monitoring syscall events that signify an attempt to establish network connections (type: SYSCALL) and targets executables that have specific characteristics, such as those ending with /telnet, /nmap, and others. If these executables are executed and attempt to connect to network services, the rule triggers a detection event, indicating possible reconnaissance or scanning attempts by malicious actors. Given that the level of risk associated with these detections is categorized as low, it is also noted that false positives may arise from legitimate administrative activities. The reference link directs users to the implementation of auditd rules for effective monitoring. Overall, this rule plays a crucial role in enhancing network security by identifying potential enumeration attacks while allowing administrators to differentiate between benign and malicious activities based on the context of the actions being performed.
Categories
- Linux
- Endpoint
Data Sources
- Process
- Network Traffic
- Logon Session
ATT&CK Techniques
- T1046
Created: 2020-10-21