
Summary
The detection rule monitors for the execution of the 'nping' command on Linux hosts. Nping, part of the Nmap tool suite, is used to send custom packets for network diagnostics and security assessments. While legitimate users like network and security engineers may utilize this tool, its misuse by unauthorized users can indicate reconnaissance or denial-of-service attack activities. This rule utilizes event data from integrations such as Elastic Defend and Auditbeat to identify when processes matching 'nping' are triggered. The rule's query is structured to look for process initiation events on Linux systems, allowing it to flag potentially malicious activities connected with network discovery and probing. Given the context of its usage, thorough investigation is required to determine if the detection is a false positive or a potential security threat.
Categories
- Linux
- Endpoint
- Network
Data Sources
- Process
- Firewall
- Network Traffic
- Application Log
- Sensor Health
ATT&CK Techniques
- T1046
Created: 2020-02-18