Skip to main content
T1046Discoveryeasy difficulty

Network Service Discovery

Network Service Discovery (T1046) is a MITRE ATT&CK technique in the Discovery tactic. SOC analysts detect it by monitoring for SIEM, Firewall events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

SIEMFirewall

What is Network Service Discovery?

Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote exploitation through weaknesses in those services. Common methods to acquire this information include port and vulnerability scanning. Within cloud environments, adversaries may attempt to discover services running on other cloud hosts. Nmap, Masscan, and internal scanning tools are commonly used for network service discovery. After gaining initial access to a network, attackers typically scan internal network ranges to identify services they can exploit for lateral movement, data exfiltration, or privilege escalation. Internal scanning activity is particularly suspicious because legitimate users rarely need to scan network ranges, and automated scanning tools running on internal hosts are strong indicators of compromise or insider threat activity.

Network Service Discovery is documented as technique T1046 in the MITRE ATT&CK knowledge base under the Discovery tactic. Detection requires visibility into SIEM, Firewall telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify Network Service Discovery activity. These methods apply across SIEM, Firewall environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor for network scanning patterns including rapid sequential connection attempts to multiple hosts on common service ports, particularly from workstations or servers that have no administrative or security operations function.

  2. 2

    Alert on execution of network scanning tools including nmap, masscan, and angry IP scanner, as well as PowerShell-based port scanners that may be used to evade detection by avoiding standalone executable files.

  3. 3

    Detect ARP scanning and ICMP-based host discovery that precedes port scanning, as attackers typically perform host discovery before service enumeration to identify live hosts on network segments.

  4. 4

    Monitor NetFlow data for internal hosts generating connection attempts to large numbers of destination IPs or ports within short time windows, which is the network-level signature of scanning activity.

  5. 5

    Alert on connections to management interfaces on network infrastructure devices including SSH to routers and switches, SNMP queries from unauthorized sources, and telnet connections from workstations.

Example Alerts

These realistic alert examples show what Network Service Discovery looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

HighSIEM

Internal Network Port Scan from Compromised Host

NetFlow analysis detected workstation WS-MKT-033 initiating TCP SYN packets to 2,847 unique IP addresses on ports 22, 80, 443, 445, 3389, and 8080 over 12 minutes. This scanning rate and port selection pattern is characteristic of nmap service discovery. The source workstation has no network administration function and should not be generating this traffic volume.

HighXDR

Nmap Execution Detected on Server

Process creation event detected on application server APP-PROD-12: nmap executed with arguments targeting the 10.0.0.0/16 internal network range with service version detection flags. Nmap is not installed as part of the standard server build and was uploaded to the system via SSH by an account that authenticated using compromised credentials 23 minutes prior.

MediumFirewall

SMB Service Scanning Detected

Firewall detected connection attempts from 192.168.45.67 to port 445 on 1,200 internal IP addresses within 8 minutes. SMB port scanning is commonly used to identify systems vulnerable to SMB exploits like EternalBlue, to find shares containing sensitive data, or to identify targets for lateral movement using Pass the Hash or Pass the Ticket attacks.

Practice Detecting Network Service Discovery

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Network Service Discovery. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect Network Service Discovery?
SOC analysts detect Network Service Discovery (T1046) by monitoring SIEM, Firewall telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor for network scanning patterns including rapid sequential connection attempts to multiple hosts on common service ports, particularly from work. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Network Service Discovery?
Network Service Discovery can be detected using SIEM, Firewall platforms. SIEM tools are particularly effective for this technique because they provide visibility into the discovery phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Network Service Discovery in real-world attacks?
Network Service Discovery is a well-documented MITRE ATT&CK technique in the Discovery tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Network Service Discovery scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Network Service Discovery for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Discovery techniques like Network Service Discovery. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Lateral Movement? — SOC Glossary

Lateral movement is the attack phase where adversaries expand access from an initial foothold to additional systems, usi…

Read more
Glossary

What is NDR? — SOC Glossary

Network Detection and Response (NDR) is a security platform that passively monitors network traffic using machine learni…

Read more
Glossary

What is Threat Hunting? — SOC Glossary

Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…

Read more
Glossary

What is SIEM? — SOC Glossary

Security Information and Event Management (SIEM) is a platform that aggregates, normalizes, and correlates log data from…

Read more
Career Path

Threat Hunter Career Guide — Salary & Skills

Threat Hunters do not wait for alerts. You develop hypotheses based on threat intelligence and adversary behavior models…

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Tool

Firewall Training Console — SOCSimulator

The Firewall console in SOCSimulator replicates the log analysis experience of enterprise platforms like Palo Alto Netwo…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more
Feature

Shift Mode — Real-Time SOC Simulation

Practice alert triage under realistic time pressure with SLA timers and noise injection.

Read more

We use cookies to improve your experience and measure usage. Learn more