
Summary
This detection rule is designed to identify potential attempts at network traversal using SSH keys across UNIX-based systems. It particularly looks for activities reminiscent of the 'SSH-Snake' tool, a utility known for its capability to automate the mapping of a network by utilizing SSH private keys. The rule targets SSH key exchange behaviors involving multiple unique target hosts within a specified time window (5 minutes). An elevated number of unique hosts, specifically more than two, indicates a suspicious pattern consistent with network traversal attempts that could potentially compromise network security. The underlying logic operates within a Splunk environment, utilizing specific commands to filter and aggregate data relevant to SSH activity. By analyzing authentication events and SSH connections across endpoints, it determines the degree of connectivity between systems, which may reveal unauthorized or malicious activity related to SSH keys and services. The rule leverages techniques such as lateral movement via remote services and credential access through unsecured credentials to enhance the detection of intrusions that signify wider security risks within the network structure.
Categories
- Linux
Data Sources
- Logon Session
- Process
- Network Traffic
- Application Log
ATT&CK Techniques
- T1021.004
- T1552.004
- T1018
Created: 2024-02-09