TCP Port 8000 Activity To The Internet | SIEM Guide [7.8] - Elastic
Có thể bạn quan tâm
TCP Port 8000 Activity to the Internet
editTCP Port 8000 is commonly used for development environments of web server software. It generally should not be exposed directly to the Internet. If you are running software like this on the Internet, you should consider placing it behind a reverse proxy.
Rule type: query
Rule indices:
- filebeat-*
Severity: low
Risk score: 21
Runs every: 5 minutes
Searches indices from: now-6m (Date Math format, see also Additional look-back time)
Maximum signals per execution: 100
Tags:
- Elastic
- Network
Version: 3 (version history)
Added (Elastic Stack release): 7.6.0
Last modified (Elastic Stack release): 7.7.0
Potential false positives
editBecause this port is in the ephemeral range, this rule may false under certain conditions, such as when a NATed web server replies to a client which has used a port in the range by coincidence. In this case, such servers can be excluded. Some applications may use this port but this is very uncommon and usually appears in local traffic using private IPs, which this rule does not match. Some cloud environments, particularly development environments, may use this port when VPNs or direct connects are not in use and cloud instances are accessed across the Internet.
Rule query
edit network.transport:tcp and destination.port:8000 and source.ip:(10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16) and not destination.ip:(10.0.0.0/8 or 127.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16 or "::1")Threat mapping
editFramework: MITRE ATT&CKTM
-
Tactic:
- Name: Command and Control
- ID: TA0011
- Reference URL: https://attack.mitre.org/tactics/TA0011/
-
Technique:
- Name: Commonly Used Port
- ID: T1043
- Reference URL: https://attack.mitre.org/techniques/T1043/
Rule version history
edit Version 3 (7.7.0 release)Updated query, changed from:
network.transport: tcp and destination.port: 8000 and ( network.direction: outbound or ( source.ip: (10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16) and not destination.ip: (10.0.0.0/8 or 172.16.0.0/12 or 192.168.0.0/16) ) ) Version 2 (7.6.1 release)- Removed auditbeat-*, packetbeat-*, and winlogbeat-* from the rule indices.
Từ khóa » Http-alt 8000 Exploit
-
Port 8000 (tcp/udp) :: SpeedGuide
-
All That Port 8000 Traffic This Week! Yeah, That's Satori Looking For ...
-
HackTheBox – Luke | InfoSec @ Rm-it
-
Enumerate Applications On Webserver - OWASP Foundation
-
RFC 7838 - HTTP Alternative Services
-
Alt-N WebAdmin USER Buffer Overflow - Rapid7
-
Scanner HTTP Auxiliary Modules - Metasploit Unleashed
-
Common Ports/services And How To Use Them · CTF
-
HTB: Devzat - 0xdf Hacks Stuff - GitLab
-
HTTP Alternate Services - IETF Tools
-
RFC 7838 - HTTP Alternative Services - IETF Tools
-
Remote
-
Find Vulnerability Of Any Target To Hack With An Open Source Tool