Accepted Default Telnet Port Connection
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
This rule detects network events that may indicate the use of Telnet traffic. Telnet is commonly used by system administrators to remotely control older or embedded systems using the command line shell. It should almost never be directly exposed to the Internet as it is frequently targeted and exploited by threat actors as an initial access or backdoor vector. As a plain-text protocol, it may also expose usernames and passwords to anyone capable of observing the traffic.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "DETECTION_ACTION_NETWORK_NETWORK_TRAFFIC" AND (DEST_PORT = 23) select Action1.HOSTNAME,Action1.SOURCE_IP,Action1.SOURCE_PORT,Action1.SOURCE_MAC,Action1.SOURCE_INTERFACE,Action1.DEST_NAME,Action1.DESTINATIONHOST,Action1.DEST_IP,Action1.DEST_PORT,Action1.DEST_MAC,Action1.DEST_INTERFACE,Action1.PROTOCOL_APP,Action1.PROTOCOL_TR,Action1.DIRECTION,Action1.DIRECTION_TR,Action1.FW_DIRECTION,Action1.URL_SITE,Action1.URL_ARG,Action1.APPLICATION,Action1.MESSAGE
Detection
Execution Mode
realtime
Log Sources
Network


