Adversaries may use Valid Accounts to log into remote machines using Secure Shell (SSH). The adversary may then perform actions as the logged-on user.
SSH is a protocol that allows authorized users to open remote shells on other computers. Many Linux and macOS versions come with SSH installed by default, although typically disabled until the user enables it. The SSH server can be configured to use standard password authentication or public-private keypairs in lieu of or in addition to a password. In this authentication scenario, the user’s public key must be in a special file on the computer running the server that lists which keypairs are allowed to login as that user.(Citation: SSH Secure Shell)
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
AC-17 | Remote Access | Protects | T1021.004 | SSH | |
AC-2 | Account Management | Protects | T1021.004 | SSH | |
AC-20 | Use of External Systems | Protects | T1021.004 | SSH | |
AC-3 | Access Enforcement | Protects | T1021.004 | SSH | |
AC-5 | Separation of Duties | Protects | T1021.004 | SSH | |
AC-6 | Least Privilege | Protects | T1021.004 | SSH | |
AC-7 | Unsuccessful Logon Attempts | Protects | T1021.004 | SSH | |
CM-2 | Baseline Configuration | Protects | T1021.004 | SSH | |
CM-5 | Access Restrictions for Change | Protects | T1021.004 | SSH | |
CM-6 | Configuration Settings | Protects | T1021.004 | SSH | |
CM-8 | System Component Inventory | Protects | T1021.004 | SSH | |
IA-2 | Identification and Authentication (organizational Users) | Protects | T1021.004 | SSH | |
IA-5 | Authenticator Management | Protects | T1021.004 | SSH | |
RA-5 | Vulnerability Monitoring and Scanning | Protects | T1021.004 | SSH | |
SI-4 | System Monitoring | Protects | T1021.004 | SSH |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
action.hacking.variety.Use of stolen creds | Use of stolen authentication credentials (including credential stuffing) | related-to | T1021.004 | Remote Services: SSH | |
action.hacking.vector.Command shell | Remote shell | related-to | T1021.004 | Remote Services: SSH |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
amazon_inspector | Amazon Inspector | technique_scores | T1021.004 | SSH |
Comments
The Amazon Inspector Best Practices assessment package can detect a security control setting related to remote service access on Linux endpoints. Specifically, "Disable root login over SSH". This information can be used identify insecure configurations and harden the endpoints. Amazon Inspector does not directly protect against adversaries accessing remote services. Given Amazon Inspector can only assess this security control on Linux platforms (although it also supports Windows) and it only restricts access to remote services for one user account, the coverage score is Minimal leading to an overall Minimal score.
References
|
amazon_virtual_private_cloud | Amazon Virtual Private Cloud | technique_scores | T1021.004 | SSH |
Comments
VPC security groups and network access control lists (NACLs) can be used to restrict direct access to remote services to trusted networks. This mitigates even an adversary with a valid account from accessing resources. This can be circumvented though if an adversary is able to compromise a trusted host and move laterally to a protected network. This results in an overall partial (coverage) score.
References
|
aws_network_firewall | AWS Network Firewall | technique_scores | T1021.004 | SSH |
Comments
AWS Network Firewall has the ability to pass, drop, or alert on traffic based on the network protocol as well as perform deep packet inspection on the payload. This functionality can be used to only allow remote services from trusted hosts (i.e., only allow remote access traffic from certain hosts). This mapping is given a score of Partial because even though it can restrict remote services traffic from untrusted hosts, it cannot protect against an adversary using a trusted host that is permitted to use remote services as part of an attack.
References
|