heroui logo

Network Connection Discovery With Net

Splunk Security Content

View Source
Summary
This rule identifies the execution of `net.exe` or `net1.exe` with command-line arguments used to list network connections. It detects potential network reconnaissance activities by adversaries or Red Teams, aiming to collect information about the network and Active Directory. The detection relies on telemetry from Endpoint Detection and Response (EDR) agents, focusing on process names and command-line executions to assess if the behavior is malicious and could enable attackers to map out the network or plan lateral movement, leading to data exfiltration.
Categories
  • Endpoint
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1049
Created: 2025-01-24