heroui logo

Linux Remote System Discovery

Sigma Rules

View Source
Summary
The rule "Linux Remote System Discovery" is designed to detect the enumeration of remote systems within a Linux environment. It identifies when an unauthorized or suspicious process attempts to discover other devices on the network. This can be indicative of reconnaissance activities that precede potential attacks. The detection is achieved by monitoring specific process creation events, specifically targeting commands such as 'arp' and 'ping'. The rule checks for command line arguments that indicate attempts to probe the local network for other active hosts by matching IP address patterns typically used in private networks as defined by IANA. Given that legitimate system administration can include similar actions, the rule carries a potential for false positives. However, its implementation as a detection mechanism is crucial for identifying potential adversarial behavior that seeks to map the network infrastructure.
Categories
  • Linux
  • Network
Data Sources
  • Process
ATT&CK Techniques
  • T1018
Created: 2020-10-22