IncidentResponsev2

4.13 Detect SMB using Security Onion (SO)

Task

Identify SMB traffic and monitor SMB-based activity using Security Onion to detect unauthorized SMB file transfers or lateral movement techniques (such as Cobalt Strike SMB P2P).


Conditions

While using Security Onion Alerts and Hunt dashboards, identify SMB traffic.


Standards

You may see results like:

ET TROJAN CobaltStrike SMB P2P Default Msagent Named Pipe Interaction
A Network Trojan was detected → High

End State


Notes

Security Onion is able to detect SMB-based threats using Suricata rules and Hunt investigations. Typical examples include:


Manual Steps


Expanded Detection Methods (Operator Enhancement)

Zeek SMB Logs (Optional)

Zeek (formerly Bro) monitors SMB traffic and logs into SMB log files.

cat /nsm/bro/logs/current/smb_files.log

Look for:

Example fields:

ts | uid | id.orig_h | id.resp_h | command | path | name

Search for executables

grep ".exe" /nsm/bro/logs/current/smb_files.log

Cloud and Hybrid Detection (Optional)

If network extends into VPN or Cloud-connected environments:

AWS

aws logs filter-log-events --log-group-name VPCFlowLogs --filter-pattern "port 445"

Azure

GCP

Operator Note: SMB traffic between cloud environments is often unexpected and should be reviewed immediately.


Running Script

N/A → Can be scripted if frequent Zeek log review is required.


Dependencies


Other Available Tools

Tool Platform Installation Usage
Security Onion (Alerts + Hunt + Zeek SMB logs) Network Native SMB traffic detection and analysis
OSSEC / Wazuh Cross-platform Package Manager Detect SMB-based file access or login attempts
Cloud native flow logs + alerts (AWS, Azure, GCP) Cloud Native Detect SMB traffic across hybrid cloud

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References


Revision History

Date Version Description Author
2025-05-02 1.0 Original retained and expanded with multi-method SMB detection + operator checklist Leo