Identify SMB traffic and network vulnerability scanning activities using Security Onion and other data sources. This includes both SMB-based indicators (such as Cobalt Strike SMB P2P) and other network scanning attempts (Nmap, Masscan, Nessus).
Given:
event.severity_label to sort alertsET POLICY SMB Executable File Transfer)All suspicious or unauthorized scanning (SMB + general vulnerability scanning) is detected and validated for legitimacy.
Security Onion is capable of detecting:
rule.nameevent.moduleevent.severity_labelevent.severity_label (High → Low)ET POLICY SMB Executable File Transfer)SMBGroup: event.module and Group: event.dataset are active (if not, click the down arrow → select | groupby event.module event.dataset)rule.name or event.severity_labelExpected result example:
ET TROJAN CobaltStrike SMB P2P Default Msagent Named Pipe Interaction
A Network Trojan was detected → High Severity
Common scan rules to look for:
ET SCAN Nmap Scripting Engine User-Agent Detected
ET SCAN Potential Masscan Activity
ET POLICY Nessus Scan Detected
ET SCAN Possible SQL Scanner
Operator Note: Apply same workflow as SMB for hunting these alerts.
Example search:
Nmap OR Masscan OR Nessus OR SMB | groupby event.module event.dataset
Review:
Multiple destinations/ports in a short time → Indicates scanning.
Get-NetTCPConnection | Group-Object -Property State
Look for:
ss -ant | grep SYN
or
netstat -ant | grep SYN
Look for GuardDuty Findings:
Recon:EC2/PortProbeUnprotectedPort
Recon:IAMUser/PortProbe
Azure Sentinel query:
AzureNetworkAnalytics_CL
| where FlowType_s == "Inbound"
| summarize count() by SourceIP_s, DestinationPort_s
gcloud logging read "resource.type=gce_subnetwork AND jsonPayload.connection.protocol=TCP"
Security Command Center → Reconnaissance → Port Scanning findings
For all detections:
TBD → scripting possible for continuous aggregation and pattern detection.
| Tool | Platform | Installation | Usage |
|---|---|---|---|
| Security Onion (Alerts + Hunt) | Network | Native | Scan + SMB detection |
| OSSEC / Wazuh | Cross-platform | Package Manager | Port scanning detection |
| AWS GuardDuty + VPC Flow Logs | AWS | Native | Detect port scanning |
| Azure Defender + NSG Flow Logs | Azure | Native | Detect port scanning |
| GCP Security Command Center + Flow Logs | GCP | Native | Detect port scanning |
| Nmap / Nessus (Red Team / Baseline) | Cross-platform | Native | Detection validation |
| Date | Version | Description | Author |
|---|---|---|---|
| 2025-05-02 | 1.1 | Rebuilt with original SMB detection + expanded multi-platform scan detection + operator workflow | Leo |