
Summary
This detection rule monitors for specific error messages generated by the OpenSSH daemon (sshd) on Linux systems. These messages typically indicate fatal or suspicious errors that may arise during exploitation attempts, such as potential misconfigurations or targeted attacks. The rule searches for keywords associated with errors that could compromise the security of SSH connections. By identifying these anomalies, it allows for prompt investigation and mitigation of potential threats against the server. The focus of the detection is on error messages such as 'unexpected internal error', 'invalid certificate signing key', and 'bad client public DH value', indicating unusual activity that could suggest an attempted compromise.
Categories
- Linux
- Endpoint
Data Sources
- Logon Session
- Process
- Application Log
Created: 2017-06-30