Network Service Discovery (T1046) is a MITRE ATT&CK technique in the Discovery tactic. SOC analysts detect it by monitoring for SIEM, Firewall events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote exploitation through weaknesses in those services. Common methods to acquire this information include port and vulnerability scanning. Within cloud environments, adversaries may attempt to discover services running on other cloud hosts. Nmap, Masscan, and internal scanning tools are commonly used for network service discovery. After gaining initial access to a network, attackers typically scan internal network ranges to identify services they can exploit for lateral movement, data exfiltration, or privilege escalation. Internal scanning activity is particularly suspicious because legitimate users rarely need to scan network ranges, and automated scanning tools running on internal hosts are strong indicators of compromise or insider threat activity.
“Network Service Discovery is documented as technique T1046 in the MITRE ATT&CK knowledge base under the Discovery tactic. Detection requires visibility into SIEM, Firewall telemetry.”
Detection Strategies
The following detection strategies help SOC analysts identify Network Service Discovery activity. These methods apply across SIEM, Firewall environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.
1
Monitor for network scanning patterns including rapid sequential connection attempts to multiple hosts on common service ports, particularly from workstations or servers that have no administrative or security operations function.
2
Alert on execution of network scanning tools including nmap, masscan, and angry IP scanner, as well as PowerShell-based port scanners that may be used to evade detection by avoiding standalone executable files.
3
Detect ARP scanning and ICMP-based host discovery that precedes port scanning, as attackers typically perform host discovery before service enumeration to identify live hosts on network segments.
4
Monitor NetFlow data for internal hosts generating connection attempts to large numbers of destination IPs or ports within short time windows, which is the network-level signature of scanning activity.
5
Alert on connections to management interfaces on network infrastructure devices including SSH to routers and switches, SNMP queries from unauthorized sources, and telnet connections from workstations.
Example Alerts
These realistic alert examples show what Network Service Discovery looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.
HighSIEM
Internal Network Port Scan from Compromised Host
NetFlow analysis detected workstation WS-MKT-033 initiating TCP SYN packets to 2,847 unique IP addresses on ports 22, 80, 443, 445, 3389, and 8080 over 12 minutes. This scanning rate and port selection pattern is characteristic of nmap service discovery. The source workstation has no network administration function and should not be generating this traffic volume.
HighXDR
Nmap Execution Detected on Server
Process creation event detected on application server APP-PROD-12: nmap executed with arguments targeting the 10.0.0.0/16 internal network range with service version detection flags. Nmap is not installed as part of the standard server build and was uploaded to the system via SSH by an account that authenticated using compromised credentials 23 minutes prior.
MediumFirewall
SMB Service Scanning Detected
Firewall detected connection attempts from 192.168.45.67 to port 445 on 1,200 internal IP addresses within 8 minutes. SMB port scanning is commonly used to identify systems vulnerable to SMB exploits like EternalBlue, to find shares containing sensitive data, or to identify targets for lateral movement using Pass the Hash or Pass the Ticket attacks.
Practice Detecting Network Service Discovery
SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including Network Service Discovery. Build detection skills with zero consequences — free forever.
How do SOC analysts detect Network Service Discovery?
SOC analysts detect Network Service Discovery (T1046) by monitoring SIEM, Firewall telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor for network scanning patterns including rapid sequential connection attempts to multiple hosts on common service ports, particularly from work. SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect Network Service Discovery?
Network Service Discovery can be detected using SIEM, Firewall platforms. SIEM tools are particularly effective for this technique because they provide visibility into the discovery phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is Network Service Discovery in real-world attacks?
Network Service Discovery is a well-documented MITRE ATT&CK technique in the Discovery tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic Network Service Discovery scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting Network Service Discovery for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Discovery techniques like Network Service Discovery. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.