heroui logo

Network Connection Discovery With Arp

Splunk Security Content

View Source
Summary
This detection rule captures the execution of the `arp.exe` command with the `-a` argument, which lists the current ARP cache and reveals active network connections. This is a common technique employed by attackers in their reconnaissance phase to gather information about available hosts within a network, which facilitates lateral movement or further targeted attacks. The rule primarily utilizes logs from Endpoint Detection and Response (EDR) agents, particularly focusing on Sysmon Event ID 1, Windows Event Log Security 4688, and CrowdStrike ProcessRollup2 for monitoring process activity. By analyzing process command-lines, this rule identifies instances of `arp.exe -a`, enabling security teams to uncover potential unauthorized network discovery attempts. It's crucial in areas where Active Directory is in use, as both red teams and malicious actors may utilize this command for network mapping. Therefore, the insights gained can help preemptively address security threats by correlating the identified behavior with known indicators of compromise.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Container
  • Process
ATT&CK Techniques
  • T1049
Created: 2024-11-13