Accepted Default Telnet Port Connection

edit

This rule detects network events that may indicate the use of Telnet traffic. Telnet is commonly used by system administrators to remotely control older or embedded systems using the command line shell. It should almost never be directly exposed to the Internet, as it is frequently targeted and exploited by threat actors as an initial access or backdoor vector. As a plain-text protocol, it may also expose usernames and passwords to anyone capable of observing the traffic.

Rule type: query

Rule indices:

  • auditbeat-*
  • filebeat-*
  • packetbeat-*
  • logs-endpoint.events.*

Severity: medium

Risk score: 47

Runs every: 5m

Searches indices from: now-9m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

References: None

Tags:

  • Elastic
  • Host
  • Network
  • Threat Detection
  • Command and Control
  • Host
  • Lateral Movement
  • Initial Access

Version: 102

Rule authors:

  • Elastic

Rule license: Elastic License v2

Rule query

edit
event.category:(network or network_traffic) and destination.port:23
  and network.direction:(inbound or ingress or outbound or egress)
  and not event.action:(
      flow_dropped or denied or deny or
      flow_terminated or timeout or Reject or network_flow)

Framework: MITRE ATT&CKTM