SigmaHQ/rules/linux/lnx_susp_ssh.yml

34 lines
1.1 KiB
YAML
Raw Normal View History

2020-05-15 15:19:32 +00:00
title: Suspicious OpenSSH Daemon Error
2019-11-12 22:12:27 +00:00
id: e76b413a-83d0-4b94-8e4c-85db4a5b8bdc
2020-09-14 04:03:04 +00:00
status: experimental
2019-11-12 22:12:27 +00:00
description: Detects suspicious SSH / SSHD error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts
2017-06-30 06:47:56 +00:00
author: Florian Roth
date: 2017/06/30
2020-05-15 15:19:32 +00:00
modified: 2020/05/15
2020-09-14 04:03:04 +00:00
references:
- https://github.com/openssh/openssh-portable/blob/master/ssherr.c
- https://github.com/ossec/ossec-hids/blob/master/etc/rules/sshd_rules.xml
2017-06-30 06:47:56 +00:00
logsource:
product: linux
service: sshd
detection:
2020-11-29 20:30:50 +00:00
keywords:
- '*unexpected internal error*'
- '*unknown or unsupported key type*'
- '*invalid certificate signing key*'
- '*invalid elliptic curve value*'
- '*incorrect signature*'
- '*error in libcrypto*'
- '*unexpected bytes remain after decoding*'
- '*fatal: buffer_get_string: bad string*'
- '*Local: crc32 compensation attack*'
- '*bad client public DH value*'
- '*Corrupted MAC on input*'
2017-06-30 06:47:56 +00:00
condition: keywords
falsepositives:
- Unknown
level: medium
2020-09-14 04:03:04 +00:00
tags:
- attack.initial_access
2020-10-16 02:05:53 +00:00
- attack.t1190