Detecting RDP Brute Force Attacks
Overview
Setting Up Detection Query
Query Explanation
Splunk Query
index="rdp_bruteforce" sourcetype="bro:rdp:json"
| bin _time span=5m
| stats count values(cookie) by _time, id.orig_h, id.resp_h
| where count > 30Field Descriptions
Interpretation of Results
Using Additional Filters (Optional)
Last updated