
Summary
The 'Network Reconnaissance Activity' rule is designed to detect network-related commands that are often utilized during the reconnaissance phase of an attack. Specifically, it focuses on the command-line usage of 'nslookup' along with the query for '_ldap._tcp.dc._msdcs.' entries, which can indicate the presence of malicious network probing. This detection leverages process creation logs within Windows environments, aimed at identifying potential threats based on command-line inputs that are characteristic of attacker behavior. The rule has a high severity level, indicating a significant risk if triggered. False positives may occur when legitimate administrative scripts or tools invoke similar commands, which necessitates careful analysis of the context in which the rule gets triggered.
Categories
- Network
- Windows
Data Sources
- Process
Created: 2022-02-07