Hello experts,
Is there a way to identify SSH Tunneling packets using the Splunk App for Stream?
From a security point of view, it would be valuable if possible.
Thank you.
hi kwchang,
Not sure I understand the question: are you asking how we can detect that something other than the normal ssh traffic (shell commands, etc) is being transferred over an ssh connection? If so, I'm not sure it's technically possible - with Stream or any other passive network sniffer - since the connection is encrypted..
Guessing here but maybe the OP means to detect the SSH protocol banners on nonstandard ports.
Unless you have the SSH private key (or the host key from the other end) for the session, you cannot identify the packets; they will look the same as any other SSH packets.
However, traffic analysis can give you clues; most "legitimate" SSH connections are used for terminal activity, some are used for file transfer. If you have an SSH tunnel being used for gaming, streaming, browsing, etc then the traffic patterns will presumably be different.
hi kwchang,
Not sure I understand the question: are you asking how we can detect that something other than the normal ssh traffic (shell commands, etc) is being transferred over an ssh connection? If so, I'm not sure it's technically possible - with Stream or any other passive network sniffer - since the connection is encrypted..