Skip to content

Nate-NJ/HoneyPot-lab-In-Azure

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

SIEM | Honeypot RDP Home Lab

Description

Project consisted of setting up Microsoft Sentinel in Azure (SIEM). I connected the SIEM to a live virtual machine configured as a honeypot. I observed live attacks from all over the world that were logged as audit failures (RDP brute force attacks) on the VM. I utilized a custom PowerShell script to identify attackers' geolocation information and plotted it on the Microsoft Sentinel map.

Languages and Utilities Used

  • PowerShell
  • SIEM
  • Microsoft Sentinel
  • Honeypot
  • Remote Desktop Protocol

Environments Used

  • Windows 11
  • Virtual Machine

Project Walk-through:

Create Virtual Machine in Azure:


Create Log Analytics Workspace:
Disk Sanitization Steps

Connect VM to Log Analytics:
Disk Sanitization Steps

Observe Event Viewer Logs in VM:
Disk Sanitization Steps

Turn off Firewall on VM to expose VM to internet (honeypot):
Disk Sanitization Steps

Ping VM IP from Command Prompt:
Disk Sanitization Steps

Link Geolocation.io API Key:
Disk Sanitization Steps

Modify Log Analytics Custom Fields to Train the Algorithm to Pull Correct Latitude and Longitude Data Points:
Disk Sanitization Steps

Extract Fields from Raw Custom Data Log:
Disk Sanitization Steps

Set up Map Query in Sentinel with Latitude and Longitude :
Disk Sanitization Steps

Configure Map Settings in Sentinel to Pin Failed Login Attempts on Map:
Disk Sanitization Steps

Final Failed Login count data (VM was live for only a few hours):
Disk Sanitization Steps

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published