Skip to content

rishikesh-security/rdp-bruteforce-detection-lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

19 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ RDP Brute-Force Attack β€” Detection & Incident Response Lab

Project Summary This project simulates a real-world RDP (Remote Desktop Protocol) brute-force attack in a controlled lab environment and demonstrates how to detect, investigate, and respond to it using a SIEM platform. The attacker machine (Kali Linux) used Hydra with the rockyou.txt wordlist to brute-force RDP credentials on a Windows target. Detection and analysis were performed using Splunk Enterprise with Windows Security logs forwarded via the Splunk Universal Forwarder.

🎯 Objectives

Simulate an RDP brute-force attack using Hydra on Kali Linux Configure Splunk Universal Forwarder to ship Windows Security logs to SIEM Detect the attack using Windows Event IDs in Splunk Reconstruct the full attack timeline through log correlation Document findings in a professional incident response report

🧰 Tools & Technologies ToolPurposeKali LinuxAttacker machine (VirtualBox VM)Hydra v9.6RDP brute-force attack toolrockyou.txtPassword wordlist (14M+ passwords)Windows 10Attack target & log sourceSplunk EnterpriseSIEM β€” log aggregation & analysisSplunk Universal ForwarderShips Windows Security logs to SplunkWindows Event ViewerSecondary log validationOracle VirtualBoxLab hypervisor

πŸ–₯️ Lab Environment Attacker: Kali Linux (VirtualBox) β†’ 10.0.2.x Target: Windows 10 (LAPTOP-SMMVETKR) β†’ 10.0.2.15 [RDP Port 3389] Host 2: Windows 10 (DESKTOP-HMUS15L) β†’ Local SIEM: Splunk Enterprise β†’ localhost:8000 Forwarder: Splunk Universal Forwarder β†’ Installed on Windows target

βš”οΈ Attack Execution Command used on Kali Linux: bashhydra -l admin -P /usr/share/wordlists/rockyou.txt rdp://10.0.2.15 What happened:

Hydra launched a dictionary attack against RDP on port 3389 Tested 14,344,399 password combinations from rockyou.txt Passwords attempted: password, 123456, iloveyou, princess, rockyou, abc123 and many more Tasks auto-reduced to 4 threads (RDP limitation)

πŸ” Detection β€” Splunk SIEM Key Event IDs Monitored Event IDNameSignificance4625Failed LogonPrimary brute-force indicator4624Successful LogonConfirms attacker gained access4672Special Privileges AssignedElevated/admin access granted4627Group Membership InfoUser group logged at logon5379Credential Manager AccessPost-compromise credential activity Splunk Queries Used EventCode=4625 EventCode=4624 Findings MetricResultFailed logons (4625) β€” 7 days12 events on DESKTOP-HMUS15LSuccessful logons (4624) β€” 60 min121 events on LAPTOP-SMMVETKRSuccessful logons (4624) β€” 5 min window2 events during peak attackElevated access (4672)Confirmed at 02:54:40 AM

⏱️ Attack Timeline 02:02:39 AM β†’ Hydra brute-force started against 10.0.2.15:3389 02:02–02:09 β†’ Multiple Event 4625 (failed logons) generated 02:09:21 AM β†’ Event 4624 β€” SUCCESSFUL LOGON (attacker authenticated) 02:10:33 AM β†’ Second successful logon in 5-minute window 02:12:38 AM β†’ Most recent successful logon β€” active session confirmed 02:14:00 AM β†’ Splunk UF confirmed running, all events forwarded 02:54:00 AM β†’ Continued activity on DESKTOP-HMUS15L 02:54:40 AM β†’ Event 4672 β€” Special privileges assigned (admin access) 02:59:00 AM β†’ Post-incident cross-validation in Windows Event Viewer

Key Findings

βœ… RDP brute-force attack successfully simulated using Hydra βœ… Attacker gained successful authentication (Event 4624 confirmed) βœ… 121 successful logon events in 60 minutes β€” highly anomalous βœ… Elevated privileges granted post-logon (Event 4672) βœ… Credential Manager access detected (Event 5379) βœ… Attack detected and correlated across multiple Windows hosts

πŸ›‘οΈ Recommendations

Account Lockout Policy β€” Lock after 5 failed attempts in 5 minutes Disable RDP on systems that don't require it; block port 3389 via firewall Enable Network Level Authentication (NLA) for all RDP connections Multi-Factor Authentication (MFA) for all remote access Splunk Alert β€” trigger on >5 Event 4625 from same host in 1 minute Strong Password Policy β€” minimum 14 characters with complexity rules

πŸ“ Repository Structure rdp-bruteforce-detection-lab/ β”‚ β”œβ”€β”€ README.md β”œβ”€β”€ report/ β”‚ └── RDP_BruteForce_Lab_Report.docx β”‚ └── screenshots/ β”œβ”€β”€ 1_hydra_attack.png β”œβ”€β”€ 2_splunk_eventcode4624.png β”œβ”€β”€ 3_splunk_eventcode4624_5min.png β”œβ”€β”€ 4_splunk_eventcode4625_60min.png β”œβ”€β”€ 5_splunk_eventcode4625_7days.png β”œβ”€β”€ 6_splunk_uf_running.png └── 7_windows_event_viewer.png

πŸ“„ Full Report The complete incident response report (including detailed analysis, evidence tables, and recommendations) is available in the report/ folder.

Author rishikesh-security Cybersecurity Enthusiast | SOC Analyst | Blue Team

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors