0027-ssh-tunnel-Exist¶
Rule ID¶
- 0027-ssh-tunnel
Category¶
- Network
Severity¶
- Critical
Compatible Versions¶
- Linux
Description¶
- Monitor whether the host has an SSH tunnel.
Scan Frequency¶
- 1 */5 * * *
Theoretical Basis¶
- An SSH tunnel, or SSH port forwarding, establishes a tunnel between an SSH client and an SSH server, forwarding network data through this tunnel to a specified port to enable network communication. SSH tunnels automatically provide corresponding encryption and decryption services, ensuring the security of data transmission. If there is an unknown SSH tunnel on the host, the host may be at risk of data leakage, so it should be within the audit scope.
Risk Items¶
-
Hacker Penetration
-
Data Leakage
-
Network Security
-
Mining Risk
-
Botnet Risk
Audit Method¶
- Verify the host process list to check if there is a process with
cmdline
assshd: root@notty
. You can execute the following command for verification:
Remediation¶
- If there is an unknown process with
cmdline
assshd: root@notty
, please executekill -9 <tunnel_pid>
to terminate the dangerous process.
Impact¶
- None
Default Value¶
- By default, processes with
cmdline
assshd: root@notty
are not allowed.
References¶
-
Emergency Response Thoughts and Procedures for Hacker Intrusion (Unofficial)
-
Recording a Real Mining Intrusion Investigation Analysis (Unofficial)
CIS Controls¶
- None