LoFP LoFP / t1046

t1046

TitleTags
a misconfgured network application or firewall may trigger this alert. security scans or test cycles may trigger this alert.
as the script block is a blob of text. false positive may occur with scripts that contain the keyword as a reference or simply use it for detection.
blocked connection events are generated via an access control policy on the firewall management console. hence no false positives should be present.
business workflows that occur very occasionally, and involve an unusual surge in network traffic, can trigger this alert. a new business workflow or a surge in business activity may trigger this alert. a misconfigured network application or firewall may trigger this alert.
internal vulnerability scanners will trigger this detection.
legitimate administration activities
legitimate administrative use
legitimate administrator activity
legitimate administrators commonly use pstools for troubleshooting and management. false positives are likely in environments where pstools are an approved operational toolset, or where automated management systems invoke them. tune by whitelisting approved management hosts, service accounts, and scheduled maintenance windows.
legitimate administrators or it staff may use advanced ip or port scanner for authorized network management or inventory purposes. validate the context of execution and apply any filters as necessary.
legitimate python scripts using the socket library or similar will trigger this. apply additional filters and perform an initial baseline before deploying.
misconfigured applications or automated scripts may generate repeated blocked traffic, particularly if attempting to reach decommissioned or restricted resources. vulnerability scanners or penetration testing tools running in authorized environments may trigger this alert. tuning may be required to exclude known internal tools or scanner ips from detection.
no false positives have been identified at this time.
normal use of hping is uncommon apart from security testing and research. use by non-security engineers is very uncommon.
some normal use of this command may originate from security engineers and network or server administrators, but this is usually not routine or unannounced. use of `nping` by non-engineers or ordinary users is uncommon.
system updates, scheduled backups, or misconfigured services may trigger this alert.
there is a potential for false positives if the dns enumeration tools are used for legitimate purposes, such as debugging or troubleshooting. it is important to investigate any alerts generated by this rule to determine if they are indicative of malicious activity or part of legitimate container activity.
tools with similar commandline (very rare)
unknown
unlikely