Potential Network Sniffing Activity Using Network Tools
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects potential network sniffing via use of network tools such as "tshark", "windump". Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Process started" AND (PROCESSNAME endswith "\tshark.exe" AND COMMANDLINE contains "-i") OR PROCESSNAME endswith "\windump.exe" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Timur Zinniatullin, oscd.community, Nasreddine Bencherchali (Nextron Systems)


