After compromising an initial machine, adversaries commonly attempt to laterally move across the network. The first step to attempt the lateral movement often involves conducting host identification, port and service scans on the internal network via the compromised machine using tools such as Nmap, Cobalt Strike, etc.

ATT&CK Detection

Technique Subtechnique(s) Tactic(s) Level of Coverage
Network Service Scanning N/A Discovery Moderate

Data Model References

Object Action Field
flow start dest_ip

Applicable Sensors


Splunk search - Identifying Internal hosts and services for lateral movement (Splunk, Sysmon native)

It should be noted that when a host/ port/ service scan is performed from a compromised machine, a single machine makes multiple calls to other hosts in the network to identify live hosts and services. This can be detected using the following query

sourcetype='firewall_logs' dest_ip = 'internal_subnet' | stats dc(dest_port) as pcount by src_ip | where pcount >5