← Back to SOC feed Coverage →

Linux Remote System Discovery

sigma LOW SigmaHQ
T1018
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

Adversaries may use Linux Remote System Discovery to identify and map networked systems, enabling further lateral movement and compromise. SOC teams should proactively hunt for this behavior to detect early-stage reconnaissance efforts and prevent potential network-wide breaches.

Detection Rule

Sigma (Original)

title: Linux Remote System Discovery
id: 11063ec2-de63-4153-935e-b1a8b9e616f1
status: test
description: Detects the enumeration of other remote systems.
references:
    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1018/T1018.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-22
modified: 2021-11-27
tags:
    - attack.discovery
    - attack.t1018
logsource:
    category: process_creation
    product: linux
detection:
    selection_1:
        Image|endswith: '/arp'
        CommandLine|contains: '-a'
    selection_2:
        Image|endswith: '/ping'
        CommandLine|contains:
            - ' 10.' # 10.0.0.0/8
            - ' 192.168.' # 192.168.0.0/16
            - ' 172.16.' # 172.16.0.0/12
            - ' 172.17.'
            - ' 172.18.'
            - ' 172.19.'
            - ' 172.20.'
            - ' 172.21.'
            - ' 172.22.'
            - ' 172.23.'
            - ' 172.24.'
            - ' 172.25.'
            - ' 172.26.'
            - ' 172.27.'
            - ' 172.28.'
            - ' 172.29.'
            - ' 172.30.'
            - ' 172.31.'
            - ' 127.' # 127.0.0.0/8
            - ' 169.254.' # 169.254.0.0/16
    condition: 1 of selection*
falsepositives:
    - Legitimate administration activities
level: low

KQL (Azure Sentinel)

imProcessCreate
| where (TargetProcessName endswith "/arp" and TargetProcessCommandLine contains "-a") or (TargetProcessName endswith "/ping" and (TargetProcessCommandLine contains " 10." or TargetProcessCommandLine contains " 192.168." or TargetProcessCommandLine contains " 172.16." or TargetProcessCommandLine contains " 172.17." or TargetProcessCommandLine contains " 172.18." or TargetProcessCommandLine contains " 172.19." or TargetProcessCommandLine contains " 172.20." or TargetProcessCommandLine contains " 172.21." or TargetProcessCommandLine contains " 172.22." or TargetProcessCommandLine contains " 172.23." or TargetProcessCommandLine contains " 172.24." or TargetProcessCommandLine contains " 172.25." or TargetProcessCommandLine contains " 172.26." or TargetProcessCommandLine contains " 172.27." or TargetProcessCommandLine contains " 172.28." or TargetProcessCommandLine contains " 172.29." or TargetProcessCommandLine contains " 172.30." or TargetProcessCommandLine contains " 172.31." or TargetProcessCommandLine contains " 127." or TargetProcessCommandLine contains " 169.254."))

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_remote_system_discovery.yml