Skip to content

This project is build for Trap the hackers from all over the world .

License

Notifications You must be signed in to change notification settings

xspatrian/honeypot-vm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

honeypot-vm

This project is build for Trap the hackers from all over the world .

Description

The Powershell script in this repository is responsible for parsing out Windows Event Log information for failed RDP attacks and using a third party API to collect geographic information about the attackers location.

The script is used in this demo where I setup Azure Sentinel (SIEM) and connect it to a live virtual machine acting as a honey pot. We will observe live attacks (RDP Brute Force) from all around the world. I will use a custom PowerShell script to look up the attackers Geolocation information and plot it on an Azure Sentinel Map!

Tools and resources utilized

  1. Azure cloud service
  2. RDP
  3. ipgeolocation API key

Languages Used

  • PowerShell: Extract RDP failed logon logs from Windows Event Viewer

Utilities Used

  • ipgeolocation.io: IP Address to Geolocation API

Report

report

World map of incoming attacks after 24 hours (geodata)

Alt text

About

This project is build for Trap the hackers from all over the world .

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published