An attacker is hammering a Windows Server with RDP login attempts. Detect the brute force, identify the successful login, trace lateral movement, and build a Splunk detection rule.
This intermediate lab places you inside an active incident. A Windows Server 2019 system is under RDP brute force attack from an external IP. You'll use Windows Security Event Logs (Event ID 4625, 4624, 4776) forwarded to Splunk to detect the attack, identify the attacker's foothold, and trace their post-compromise actions.
You'll finish by writing a Splunk detection rule that would have caught this attack โ a real-world deliverable SOC analysts produce during incident response.
Alert received: 2024-11-18 02:47:11 UTC
An automated alert fired at 02:47 UTC. The alert rule detected more than 20 failed RDP logins from a single external IP within a 5-minute window targeting WINSERVER-02. Your mission: confirm the attack, determine if it was successful, and identify what the attacker did after getting in.
Step 1: Boot the lab VM. Open Splunk at localhost:8000. Navigate to the "RDP_INVESTIGATION" app.
Step 2: Count failed logins per source IP:
Step 3: You'll see IP 203.0.113.45 with 847 failed attempts. Now check if any succeeded:
Step 4: Successful login at 02:51:34 UTC as user "Administrator". Logon type 10 (RemoteInteractive = RDP). Now check post-compromise activity:
Step 5: You'll find Event 7045 โ a new service "svchost64" was created at 02:54:18 UTC. This is persistence via a malicious service. Flag as Critical. Escalate immediately.