heroui logo

Potential Remote Desktop Tunneling

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potential remote desktop tunneling via SSH utilities, which can be leveraged by attackers for lateral movement within a network. The rule specifically targets the command line arguments typically associated with SSH connections that may facilitate Remote Desktop Protocol (RDP) tunneling. By monitoring for specific command line patterns, such as options for port forwarding or using the default RDP port (3389), the detection aims to flag unauthorized or suspicious tunneling attempts that could allow attackers to route traffic and potentially gain access to restricted network resources. Such activity is significant as it represents a method of obfuscating malicious access and can signal an ongoing attack strategy aimed at network infiltration and lateral movement.
Categories
  • Network
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-09-27