Skip to content

[BUG] ESCU - Outbound Network Connection from Java Using Default Ports - Rule #3751

@thegreatmhn

Description

@thegreatmhn

Detects outbound network connections initiated by Java processes (java.exe, javaw.exe) to default ports commonly used by LDAP or RMI services (e.g., 389, 636, 1389, 1099).
Such activity may indicate attempts to perform JNDI lookups or remote class loading, which are often observed in exploitation of Java-based vulnerabilities (e.g., Log4Shell) or malicious Java applications communicating with external servers.
The original SPL uses a join on the process_id field between the Endpoint.Processes and Network_Traffic.All_Traffic datamodels.
However, due to the 50,000-row limit in subsearch results and ESCU's internal policy discouraging join operations—especially across network-related data models—it is recommended to replace the join with a direct filter using the All_Traffic.app field
Replace the join section with a where clause such as:
| tstats security_content_summariesonly count FROM datamodel=Network_Traffic.All_Traffic
where (All_Traffic.dest_port IN (389, 636, 1389, 1099))
AND All_Traffic.app IN ("*java.exe", "*javaw.exe")
This modification improves rule performance, reduces search cost, and increases accuracy by directly correlating network traffic generated by Java processes without exceeding subsearch limits.

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions