
Summary
The threat detection rule titled 'Hping Process Activity' identifies and tracks the execution of the Hping tool on Linux systems. Hping is commonly used for constructing and analyzing network packets and can be leveraged by adversaries for reconnaissance activities, such as network scanning and firewall probing. The rule is set up to trigger when specific process events indicate that Hping is initiated on a Linux host, thus flagging potential misuse. False positives are possible, especially during legitimate network testing by security teams. To minimize these alerts, exceptions may need to be created for known IPs or accounts routinely utilizing Hping for legitimate purposes. The detection query utilizes EQL (Event Query Language) and monitors various event indices for signs that Hping is being executed, focusing on processes named 'hping', 'hping2', and 'hping3'. The setup for effective detection requires integrations such as Elastic Defend and Auditbeat, enabling comprehensive monitoring of events. The risk score for this rule is set at 47, indicating a medium-level risk associated with Hping activity; hence, detailed investigations may need to be performed on any triggered alerts to determine their legitimacy within the operational context.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Application Log
- Network Traffic
- File
- Command
ATT&CK Techniques
- T1082
Created: 2020-02-18