Replies: 5 comments 4 replies
-
Thank you for sharing, I will add this to the recipes code section |
Beta Was this translation helpful? Give feedback.
-
Script-Block-RDWeb-Brute-Force-Attempts.txt Hi guys! So I am also getting tons of 4625 events on my servers, seems like they are trying to do brute force attacks to the RDWeb servers. So far, I found a way to block the attacks, and created this script, which I attached. Hopefully this can be integrated in the next version of IPBAN. Thank you for your hard work and excellent product! Note: updating the script with new versions when it get optimized or revised. |
Beta Was this translation helpful? Give feedback.
-
The RDS recipe helped but as of 19/03/24, lots of our RDWEB servers are getting hit with a HTTP User Agent of "node-fetch/1.0" or blank. I believe they are using this (https://github.com/node-fetch/node-fetch/) Examples of node-fetch from IIS logs below: Examples of null/blank user agent from IIS logs below: We already had the RDWEB recipe above but this didn't stop the hack. To get around this we have installed IIS URL Rewrite onto the servers. We created an inbound rule with the following settings and this has stopped the attack for now: Name: Block Bad UserAgent Conditions Condition1 Condition2 Action |
Beta Was this translation helpful? Give feedback.
-
@martinbenze That shouldn't have been necessary. The regex should find those log entries. I've created a regex101 to prove it. |
Beta Was this translation helpful? Give feedback.
-
I created an http module so you can use the usernames from failed logins with your recipe and IPBan. It captures the http post data of just the username and appends it to the iis logs. You have to change config on RDP server slightly but it's minimally intrusive. https://github.com/skreel/RdpDomainUserNameLogger Here is the updated failed login regex to then capture the user name:
|
Beta Was this translation helpful? Give feedback.
-
The remote desktop web interface doesn't work with IPBan stock as the events generated in the security log don't have the IP addresses for where the failed logins have come from.
These can instead be pulled from the IIS logs - I've done a bit of Regex and come up with a recipe that works with both the newer HTML5 and the older web interface (only tested on my server which is Windows Server 2016....)
The only caveat is that it can't report which usernames failed to login - these can be cross referenced and looked up in event viewer but IPBan can't pull that data across automatically. Usernames are reported for successful logins.
RDS.txt
Thanks for your work on IPBan!
Beta Was this translation helpful? Give feedback.
All reactions