Zeek RDP rule

This commit is contained in:
Josh Brower 2020-08-23 13:16:42 -04:00
parent 437a807a1d
commit 4c4b8db7cf
No known key found for this signature in database
GPG Key ID: 72D83895D62833EA

View File

@ -0,0 +1,45 @@
title: Publicly Accessible RDP Service
id: 1fc0809e-06bf-4de3-ad52-25e5263b7623
status: experimental
description: Detects connections from routable IPs to an RDP listener - which is indicative of a publicly-accessible RDP service.
references:
- https://attack.mitre.org/techniques/T1021/001/
tags:
- attack.t1021
- attack.t1021.001
author: 'Josh Brower @DefensiveDepth'
date: 2020/08/22
logsource:
product: zeek
service: rdp
detection:
selection:
src_ip|startswith:
- '192.168.'
- '10.'
- '172.16.'
- '172.17.'
- '172.18.'
- '172.19.'
- '172.20.'
- '172.21.'
- '172.22.'
- '172.23.'
- '172.24.'
- '172.25.'
- '172.26.'
- '172.27.'
- '172.28.'
- '172.29.'
- '172.30.'
- '172.31.'
#approved_rdp:
#dst_ip:
#- x.x.x.x
condition: not selection #and not approved_rdp
fields:
- src_ip
- dst_ip
falsepositives:
- none
level: high