Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Raiders of the Lost RDP: The Haag Crusade #3211

Merged
merged 9 commits into from
Dec 2, 2024
Merged

Raiders of the Lost RDP: The Haag Crusade #3211

merged 9 commits into from
Dec 2, 2024

Conversation

MHaggis
Copy link
Contributor

@MHaggis MHaggis commented Nov 25, 2024

Enhanced RDP Security Monitoring Suite

This PR introduces a comprehensive set of detections and supporting components for monitoring Windows Remote Desktop Protocol (RDP) activities, enhancing our ability to detect potential lateral movement and unauthorized remote access.

New Detections

1. Windows RDP File Execution

  • Monitors execution of .rdp files from high-risk directories
  • Focuses on temp folders, download directories, and Outlook temporary locations
  • Helps identify potential spear-phishing campaigns using malicious RDP files

2. Windows RDPClient Connection Sequence Events

  • Tracks RDP ClientActiveX connection attempts (Event ID 1024)
  • Provides visibility into initial connection sequences
  • Helps identify unusual remote access patterns and potential lateral movement

Infrastructure Additions

New Data Source

  • Added support for Microsoft-Windows-TerminalServices-RDPClient/Operational logs
  • Specifically tracking Event ID 1024 for connection sequence monitoring
  • Enhances visibility into RDP client-side activities

New Macro

  • Introduced wineventlog_rdp macro for standardized RDP event querying
  • Improves consistency across RDP-related detections
  • Simplifies future RDP detection development

Screenshots

  • Added detection screenshots for validation and documentation
  • Demonstrates expected data presentation and field mapping

Windows RDP File Execution

image

Windows RDPClient Connection Sequence Events

image

Testing

  • Validated against Attack Range dataset
  • Confirmed detection of RDP connection sequences
  • Verified file execution monitoring capabilities

@mvelazc0
Copy link
Contributor

cool use case buddy !

MHaggis and others added 5 commits November 25, 2024 15:47
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
minor typos or <update> still present
in drilldown.
Copy link
Collaborator

@pyth0n1c pyth0n1c left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed and approved after some minor typo updates.
Will merge after CI completes :)

@pyth0n1c pyth0n1c merged commit 7ae38fe into develop Dec 2, 2024
6 checks passed
@pyth0n1c pyth0n1c deleted the rdpland branch December 2, 2024 22:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants