24
RDP Traps ? (lemmy.sdf.org)
submitted 1 year ago* (last edited 1 year ago) by wgs@lemmy.sdf.org to c/cybersecurity@sh.itjust.works

I've recently dug into my firewall logs and the most traffic I seem to receive from internet is targeting port 3389.

While I could just blacklist the source IPs and call it a day, I would like to actually listen on this port and "trap" them in a fake RDP connection.

There are tools like endlessh, and I've found that you can do the same for http by sending an endless stream of headers. I would like to do the same for RDP, and before I start digging into the whole spec, I was wondering if there is already something similar for RDP.

Is anyone aware of that ? Is that even a thing ?

you are viewing a single comment's thread
view the rest of the comments
[-] pp99@sh.itjust.works 2 points 1 year ago

you can use iptables tarpit target. it works on the transport layer so it should work with any application layer protocol.

[-] wgs@lemmy.sdf.org 1 points 1 year ago

I didn't know there was a tarpit target for iptables, that's neat. Unfortunately I run OpenBSD and pf so I can't use it, but I'll look into how it works to see if I can replicate it in my setup. Thanks !

this post was submitted on 04 Aug 2023
24 points (96.2% liked)

Cybersecurity

5687 readers
42 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS