packetStrider - A Network Packet Forensics Tool For SSH
SSH is obviously encrypted, yet valuable contextual information still exists within the network traffic that can go towards TTP's, intent, success and magnitude of actions on objectives. There may even exist situations where valuable context is not available or deleted from hosts, and so having an immutable and un-alterable passive network capture gives additional forensic context. Separately to the forensic context, packet strider predictions could also be used in an active fashion, for example to shun/RST forward connections if a tunneled reverse SSH session initiation feature is predicted within, even before reverse authentication is offered. The pcap "forward_reverse.pcap" is from a common TTP of a Reverse SSH shell, a favorite of red teams everywhere. Now on the attacker's machine (the server), a reverse shell is initiated back to the victim: Then finally with the Forward session the session is closed, just to demonstrate that the forward SSH feature detection still works.
Mar-10-2021, 08:41:23 GMT
- Technology: