Identify SMB traffic and network vulnerability scanning activities using Security Onion and other data sources. This includes both SMB-based indicators (such as Cobalt Strike SMB P2P) and other network scanning attempts (Nmap, Masscan, Nessus).
Given:
event.severity_label
to sort alertsET POLICY SMB Executable File Transfer
)All suspicious or unauthorized scanning (SMB + general vulnerability scanning) is detected and validated for legitimacy.
Security Onion is capable of detecting:
rule.name
event.module
event.severity_label
event.severity_label
(High → Low)ET POLICY SMB Executable File Transfer
)SMB
Group: event.module
and Group: event.dataset
are active (if not, click the down arrow → select | groupby event.module event.dataset
)rule.name
or event.severity_label
Expected result example:
ET TROJAN CobaltStrike SMB P2P Default Msagent Named Pipe Interaction
A Network Trojan was detected → High Severity
Common scan rules to look for:
ET SCAN Nmap Scripting Engine User-Agent Detected
ET SCAN Potential Masscan Activity
ET POLICY Nessus Scan Detected
ET SCAN Possible SQL Scanner
Operator Note: Apply same workflow as SMB for hunting these alerts.
Example search:
Nmap OR Masscan OR Nessus OR SMB | groupby event.module event.dataset
Review:
Multiple destinations/ports in a short time → Indicates scanning.
Get-NetTCPConnection | Group-Object -Property State
Look for:
ss -ant | grep SYN
or
netstat -ant | grep SYN
Look for GuardDuty Findings:
Recon:EC2/PortProbeUnprotectedPort
Recon:IAMUser/PortProbe
Azure Sentinel query:
AzureNetworkAnalytics_CL
| where FlowType_s == "Inbound"
| summarize count() by SourceIP_s, DestinationPort_s
gcloud logging read "resource.type=gce_subnetwork AND jsonPayload.connection.protocol=TCP"
Security Command Center → Reconnaissance → Port Scanning findings
For all detections:
TBD → scripting possible for continuous aggregation and pattern detection.
Tool | Platform | Installation | Usage |
---|---|---|---|
Security Onion (Alerts + Hunt) | Network | Native | Scan + SMB detection |
OSSEC / Wazuh | Cross-platform | Package Manager | Port scanning detection |
AWS GuardDuty + VPC Flow Logs | AWS | Native | Detect port scanning |
Azure Defender + NSG Flow Logs | Azure | Native | Detect port scanning |
GCP Security Command Center + Flow Logs | GCP | Native | Detect port scanning |
Nmap / Nessus (Red Team / Baseline) | Cross-platform | Native | Detection validation |
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.1 | Rebuilt with original SMB detection + expanded multi-platform scan detection + operator workflow | Leo |