Detecting brute force on Windows hosts

884 views
Skip to first unread message

PentesterD

unread,
Dec 21, 2022, 3:33:04 AM12/21/22
to Wazuh mailing list
Hello,

I am new to Wazuh. Trying to follow this guide for a demo:


This works as expected for SSH brute force on a Linux host. But there is nothing triggering when I try to brute force using RDP on a Windows host.

All I have done is installed the Wazuh agent on both Windows and Linux hosts.And I can see that both are reporting back to the Wazuh manager.

Is there any additional configuration that I need to do to see the brute force attempts on the Windows host? It works out of the box for the Linux host.

Thanks

Pacome Kemkeu

unread,
Dec 21, 2022, 3:53:10 AM12/21/22
to Wazuh mailing list
Hello,

For the Windows use case, it’s required to enable RDP on the victim endpoint before running the attack.
You can use the following resource to enable it if you didn't.

If you are using a Windows version other than Windows 11 or 10, in order to track user logon activities, you'll need to enable windows 7 audit logon events.
Kindly follow this link to perform this in that case.

After that, restart the wazuh agent and perform the brute force attack. The alerts should appear on your dashboard.

I hope this helps you!

Message has been deleted

PentesterD

unread,
Dec 21, 2022, 5:34:31 AM12/21/22
to Wazuh mailing list
Enabling Windows 7 logon events was the key. I am able to see those events now. I have a follow up question. Just like we have the rule 5712 - "SSHD brute force trying to get access to the system", don't we have anything that catches RDP brute force?

Pacome Kemkeu

unread,
Dec 21, 2022, 6:39:05 AM12/21/22
to Wazuh mailing list
Hello PentesterD,
Can you please submit a full log at that event? I'll help you write a custom rule to flag it.

PentesterD

unread,
Dec 23, 2022, 3:33:41 AM12/23/22
to Wazuh mailing list
I was able to write the rule. Thanks.

Darwin

unread,
Mar 6, 2024, 2:35:38 PM3/6/24
to Wazuh | Mailing List
Can you write the rule please. I'm still a rookie
Reply all
Reply to author
Forward
0 new messages