
Summary
This detection rule monitors network activity on TCP Port 8000, which is often associated with development environments for web servers. The rule triggers an alert when traffic is detected from private IP addresses to the internet on this port. It highlights that, generally, TCP Port 8000 should not be exposed directly to the internet, and if necessary, should be placed behind a reverse proxy to mitigate risk. The rule is designed to catch potential Command and Control (C2) activities that might misuse this common port. However, it has a low risk score and recognizes the potential for false positives due to the ephemeral nature of port 8000, particularly in cloud development environments or NAT scenarios, where legitimate traffic may slip through. As such, administrators should consider the context of the alerts before taking action, especially in cases where the port is used in a controlled internal manner.
Categories
- Network
- Endpoint
Data Sources
- Network Traffic
- Logon Session
- Process
Created: 2020-02-18