Accepted Default Telnet Port Connection

Last updated on:

About the rule

Rule Type

Standard

Rule Description

This rule detects network events that may indicate the use of Telnet traffic. Telnet is commonly used by system administrators to remotely control older or embedded systems using the command line shell. It should almost never be directly exposed to the Internet as it is frequently targeted and exploited by threat actors as an initial access or backdoor vector. As a plain-text protocol, it may also expose usernames and passwords to anyone capable of observing the traffic.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "DETECTION_ACTION_NETWORK_NETWORK_TRAFFIC" AND (DEST_PORT = 23) select Action1.HOSTNAME,Action1.SOURCE_IP,Action1.SOURCE_PORT,Action1.SOURCE_MAC,Action1.SOURCE_INTERFACE,Action1.DEST_NAME,Action1.DESTINATIONHOST,Action1.DEST_IP,Action1.DEST_PORT,Action1.DEST_MAC,Action1.DEST_INTERFACE,Action1.PROTOCOL_APP,Action1.PROTOCOL_TR,Action1.DIRECTION,Action1.DIRECTION_TR,Action1.FW_DIRECTION,Action1.URL_SITE,Action1.URL_ARG,Action1.APPLICATION,Action1.MESSAGE

Detection

Execution Mode

realtime

Log Sources

Network