After compromising an initial machine, adversaries commonly attempt to laterally move across the network. The first step to attempt the lateral movement often involves conducting host identification, port and service scans on the internal network via the compromised machine using tools such as Nmap, Cobalt Strike, etc.

ATT&CK Detections

Technique Subtechnique(s) Tactic(s) Level of Coverage
Network Service Discovery N/A Discovery Moderate

D3FEND Techniques

ID Name
D3-CAA Connection Attempt Analysis

Data Model References

Object Action Field
flow start dest_ip


Splunk search - Identifying Internal hosts and services for lateral movement (Splunk, Sysmon native)

It should be noted that when a host/ port/ service scan is performed from a compromised machine, a single machine makes multiple calls to other hosts in the network to identify live hosts and services. This can be detected using the following query

sourcetype='firewall_logs' dest_ip = 'internal_subnet' | stats dc(dest_port) as pcount by src_ip | where pcount >5