← Back to SOC feed Coverage →

Linux Network Service Scanning Tools Execution

sigma LOW SigmaHQ
T1046
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

The hypothesis is that an adversary is using network scanning tools to enumerate active services on a target network, which is a common early-stage reconnaissance behavior in cyber attacks. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential compromise and disrupt adversarial reconnaissance efforts before they escalate.

Detection Rule

Sigma (Original)

title: Linux Network Service Scanning Tools Execution
id: 3e102cd9-a70d-4a7a-9508-403963092f31
status: test
description: Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.
references:
    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md
    - https://github.com/projectdiscovery/naabu
    - https://github.com/Tib3rius/AutoRecon
author: Alejandro Ortuno, oscd.community, Georg Lauenstein (sure[secure])
date: 2020-10-21
modified: 2024-09-19
tags:
    - attack.discovery
    - attack.t1046
logsource:
    category: process_creation
    product: linux
detection:
    selection_netcat:
        Image|endswith:
            - '/nc'
            - '/ncat'
            - '/netcat'
            - '/socat'
    selection_network_scanning_tools:
        Image|endswith:
            - '/autorecon'
            - '/hping'
            - '/hping2'
            - '/hping3'
            - '/naabu'
            - '/nmap'
            - '/nping'
            - '/telnet' # could be wget, curl, ssh, many things. basically everything that is able to do network connection. consider fine tuning
            - '/zenmap'
    filter_main_netcat_listen_flag:
        CommandLine|contains:
            - ' --listen '
            - ' -l '
    condition: (selection_netcat and not filter_main_netcat_listen_flag) or selection_network_scanning_tools
falsepositives:
    - Legitimate administration activities
level: low

KQL (Azure Sentinel)

imProcessCreate
| where ((TargetProcessName endswith "/nc" or TargetProcessName endswith "/ncat" or TargetProcessName endswith "/netcat" or TargetProcessName endswith "/socat") and (not((TargetProcessCommandLine contains " --listen " or TargetProcessCommandLine contains " -l ")))) or (TargetProcessName endswith "/autorecon" or TargetProcessName endswith "/hping" or TargetProcessName endswith "/hping2" or TargetProcessName endswith "/hping3" or TargetProcessName endswith "/naabu" or TargetProcessName endswith "/nmap" or TargetProcessName endswith "/nping" or TargetProcessName endswith "/telnet" or TargetProcessName endswith "/zenmap")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_susp_network_utilities_execution.yml