Query Details
**Suspicious SSH connection inspections** **Description:** The aim of this query is detect SSH connections attempts where the external sources are specifying babeld (Network Protocol) or Conker (Network Conf. Manager) as parameters to establish a connection, is detect suspicious activity such as: - Unauthorized SSH connections. - Malicious use of SSH for lateral movement within a network. - Exfiltration attempts via SSH tunneling. ``` DeviceNetworkEvents | where ActionType has "SshConnectionInspected" | extend CountryIP = tostring(geo_info_from_ip_address(RemoteIP).country), server = tostring(parse_json(AdditionalFields).server) | where isnotempty(CountryIP) | where server contains "babeld" or server contains "conker" | project Timestamp,ActionType, RemoteIP, RemotePort,CountryIP, server, auth_success = tostring(parse_json(AdditionalFields).auth_success), client = tostring(parse_json(AdditionalFields).client)```
This query is designed to identify potentially suspicious SSH connection attempts. Specifically, it looks for connections where external sources are using certain parameters (babeld or Conker) that might indicate unauthorized or malicious activity. Here’s a simple breakdown of what the query does:
In summary, this query helps in detecting and investigating potentially unauthorized or malicious SSH activities by focusing on specific parameters that might indicate such behavior.

Sergio Albea
Released: September 18, 2024
Tables
Keywords
Operators