RDP Brute Force Attack Simulation & Detection

Real SOC Incident Report & Response Project

📊 Key Metrics

< 2 min

Detection Time

100+

Failed Attempts

0

Compromise

High

Severity

📄 Executive Summary

This project demonstrates a complete SOC workflow including attack simulation, detection, investigation, and response. A brute force attack was launched from Kali Linux targeting a Windows system via RDP. Splunk SIEM was used for monitoring and detection. The project highlights how real SOC analysts identify suspicious patterns, analyze logs, and take action to mitigate threats. This reflects real-world enterprise-level incident handling and security monitoring practices.

This project demonstrates how early detection of brute force attacks prevents unauthorized access, protects sensitive data, and ensures business continuity.

💼 Skills Demonstrated

🧰 Tools Used

🧠 Threat Intelligence Insight

RDP brute force attacks are commonly used by attackers to gain initial access in enterprise environments. These attacks are frequently linked to ransomware campaigns and credential stuffing attempts.

💣 Business Impact

🛡️ SOC Response & Mitigation Strategy

Detection: Identified multiple failed logins using Event ID 4625 indicating brute force activity.

Triage: Verified attack source IP, checked account validity, and confirmed no successful login.

Investigation: Reviewed Event IDs 4624, 4672, and 4688 to check for compromise.

Containment: Blocked attacker IP, disabled account, enforced lockout policy.

Eradication: Removed any suspicious access and reset credentials.

Recovery: Re-enabled account securely and monitored activity.

Prevention: Enabled MFA, restricted RDP, and enforced strong password policy.

🟢 Phase 1: Lab Setup

A controlled lab environment was created with Kali Linux as attacker and Windows as target.

ip a
ipconfig

Figure 1: Kali Linux IP Configuration

Figure 2: Windows IP Configuration

⚙️ Phase 2: Configuration

net user NewUser1 Password123 /add
net localgroup "Remote Desktop Users" NewUser1 /add
SystemPropertiesRemote
netsh advfirewall firewall set rule group="remote desktop" new enable=Yes

Figure 3: System Configuration

⚔️ Phase 3: Attack Execution

xfreerdp3 /v:10.228.33.171 /u:NewUser1 /p:WrongPass123

Figure 4: Brute Force Attack Execution

🔍 Phase 4: Detection

index=* EventCode=4625
| stats count by Account_Name, Source_Network_Address

This query identifies failed login attempts and groups them by user and source IP to detect abnormal patterns.

Figure 5: Splunk Detection Logs

🧠 Phase 5: Analysis

Analysis revealed multiple failed login attempts from a single IP within a short time. No successful login was observed, confirming an unsuccessful attack attempt.

Figure 6: Log Analysis

🚨 Phase 6: Incident Response

index=* EventCode=4740

The system triggered an account lockout, preventing further unauthorized access.

Figure 7: Account Lockout Event

📊 Detection Rule

Alert triggered when failed login attempts exceed threshold (e.g., 10 attempts within 1 minute).

⚠️ Alert Classification

Severity: High

Confidence: High

🎯 MITRE ATT&CK Mapping

Technique: T1110 - Brute Force

⏱️ Attack Timeline

10:01 - Initial login attempt

10:02 - Multiple failed attempts detected

10:04 - High frequency login failures

10:05 - Account lockout triggered

📄 Final SOC Report

Incident: RDP Brute Force Attack
Source IP: 10.228.33.41
Target: NewUser1
Detection: Event ID 4625
Impact: Account lockout
MITRE: T1110

Conclusion: Detected and prevented unauthorized access, ensuring system security and reducing risk of account compromise.

🚀 Why Hire Me?