GEN:SID | 1:1927 |
Message | FTP authorized_keys |
Summary | This event is generated when activity relating to spurious ftp traffic is detected on the network.
|
Impact | Varies from information gathering to a serious compromise of an ftp server.
|
Detailed Information | FTP is used to transfer files between hosts. This event is indicative of spurious activity in FTP traffic between hosts.
The event may be the result of a transfer of a known protected file or it could be an attempt to compromise the FTP server by overflowing a buffer in the FTP daemon or service.
In this case, the rule will generate an event due to the attempted transfer of an authorized_keys file. This file is used in ssh communications to authenticate a user without the need for a password. Retrieval of this file may allow an attacker to gain valuable information about the hosts allowed to gain access to the machine via ssh, included the hostname, IP address and the username belonging to the authorized user. The attacker may have access to the users .ssh directory in which case the public and private keys for that user may also be at risk.
|
Affected Systems | |
Attack Scenarios | A user may transfer sensitive company information to an external party using FTP.
An attacker might utilize a vulnerability in an FTP daemon to gain access to a host, then upload a Trojan Horse program to gain control of that host.
|
Ease of Attack | Simple.
|
Corrective Action | Disallow access to FTP resources from hosts external to the protected network.
Use secure shell (ssh) to transfer files as a replacement for FTP.
|
Additional References | The manual page for ssh on the system in question.
|