Skip to content

Commit 8e0c230

Browse files
Update detections/deprecated/remote_desktop_network_bruteforce.yml
Co-authored-by: Nasreddine Bencherchali <[email protected]>
1 parent 503a371 commit 8e0c230

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/deprecated/remote_desktop_network_bruteforce.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: '2025-01-10'
55
author: Jose Hernandez, Bhavin Patel, Splunk
66
status: deprecated
77
type: TTP
8-
description: The following analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. This query detects potential RDP brute force attacks by identifying source IPs that have made more than 10 successful connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity.
8+
description: The following analytic has been deprecated in favor of "Windows Remote Desktop Network Bruteforce Attempt". The following analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. This query detects potential RDP brute force attacks by identifying source IPs that have made more than 10 successful connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity.
99
data_source:
1010
- Sysmon EventID 3
1111
search: >-

0 commit comments

Comments
 (0)