Skip to content

Commit 64d442b

Browse files
committed
updating search name
1 parent cbb282b commit 64d442b

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

detections/network/windows_remote_desktop_network_bruteforce_attempt.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,21 @@
1-
name: Remote Desktop Network Bruteforce
2-
id: a98727cc-286b-4ff2-b898-41df64695923
1+
name: Windows Remote Desktop Network Bruteforce Attempt
2+
id: 908bf0d5-0983-4afd-b6a4-e9eb5d361a7d
33
version: 6
44
date: '2025-01-10'
55
author: Jose Hernandez, Bhavin Patel, Splunk
66
status: production
77
type: TTP
8-
description: The following analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. This query detects potential RDP brute force attacks by identifying source IPs that have made more than 10 successful connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity.
8+
description: The following analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. This query detects potential RDP brute force attacks by identifying source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity.
99
data_source:
1010
- Sysmon EventID 3
1111
search: >-
12-
| tstats `security_content_summariesonly` count, min(_time) as firstTime, max(_time) as lastTime from datamodel=Network_Traffic where (All_Traffic.app=rdp OR All_Traffic.dest_port=3389) AND All_Traffic.action=allowed by All_Traffic.src, All_Traffic.dest, All_Traffic.dest_port All_Traffic.user All_Traffic.vendor_product
12+
| tstats `security_content_summariesonly` count, min(_time) as firstTime, max(_time) as lastTime values(Al_Traffic.action) as action from datamodel=Network_Traffic where (All_Traffic.app=rdp OR All_Traffic.dest_port=3389) by All_Traffic.src, All_Traffic.dest, All_Traffic.dest_port All_Traffic.user All_Traffic.vendor_product
1313
| `drop_dm_object_name("All_Traffic")`
1414
| eval duration=lastTime-firstTime
1515
| where count > 10 AND duration < 3600
1616
| `security_content_ctime(firstTime)`
1717
| `security_content_ctime(lastTime)`
18-
| `remote_desktop_network_bruteforce_filter`
18+
| `windows_remote_desktop_network_bruteforce_attempt_filter`
1919
how_to_implement: You must ensure that your network traffic data is populating the Network_Traffic data model. Adjust the count and duration thresholds as necessary to tune the sensitivity of your detection.
2020
known_false_positives: RDP gateways may have unusually high amounts of traffic from all other hosts' RDP applications in the network.Any legitimate RDP traffic using wrong/expired credentials will be also detected as a false positive.
2121
references:

0 commit comments

Comments
 (0)