LoFP LoFP / t1090

t1090

TitleTags
false positives may be present based on proxy usage internally. filter as needed.
false positives may be present if ngrok is an authorized utility. filter as needed.
false positives will be present based on organizations that allow the use of ngrok. filter or monitor as needed.
legitimate administration activities
legitimate administration activity
legitimate usage of cloudflare quick tunnel
legitimate usage of cloudflared portable versions
legitimate usage of cloudflared tunnel.
legitimate usage of cloudflared.
legitimate use
legitimate use of ngrok
legitimate use of the ngrok service.
none at this time
programs that connect locally to the rdp port
some false positives may occur with other tools with similar commandlines
some vpn applications are known to launch netsh.exe. outside of these instances, it is unusual for an executable to launch netsh.exe and run commands.
synergy software kvm (https://symless.com/synergy)
tor client activity is uncommon in managed enterprise networks but may be common in unmanaged or public networks where few security policies apply. because these ports are in the ephemeral range, this rule may false under certain conditions such as when a nated web server replies to a client which has used one of these ports by coincidence. in this case, such servers can be excluded if desired.
unlikely
using an ip address that is shared by many users
we recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
wsl2 network bridge powershell script used for wsl/kubernetes/docker (e.g. https://github.com/microsoft/wsl/issues/4150#issuecomment-504209723)