heroui logo

MacOS Network Service Scanning

Sigma Rules

View Source
Summary
The rule 'MacOS Network Service Scanning' is designed to detect potential enumeration of local or remote network services on macOS systems. It focuses on the behavior of specific processes that may signify scanning activities commonly associated with network discovery techniques used by attackers. The detection logic consists of two selections: the first targets processes typically associated with network scanning, such as 'nc' and 'netcat', while the second selection looks for tools like 'nmap' or 'telnet'. The rule further refines detections by filtering command-line arguments that include the letter 'l', which is often used as part of the command options in scanning commands. The condition for alerting is raised if either the first selection is met without being filtered or if the second selection is identified. False positives may arise from legitimate administrative activities that utilize the same tools.
Categories
  • macOS
  • Network
Data Sources
  • Process
ATT&CK Techniques
  • T1046
Created: 2020-10-21