Uploaded by Kwethemba Nkabinde

Monitoring Failed Login Attempts: A Security Use Case

advertisement
Use Case: Monitoring Failed Login Attempts
Objective Detect and respond to multiple failed login attempts to identify potential brute force
attacks or unauthorized access attempts.
Data Sources

Windows Event Logs:


Firewall Logs:


Track network access and connections.
Active Directory (AD) Logs:


Event ID 4625: Failed logon.
Record login attempts and account lockouts.
Endpoint Logs:

Capture detailed information about activities on endpoints.
Detection Logic Identify patterns of multiple failed login attempts within a short time frame to
detect potential brute force attacks.
Steps to Implement and Test
1. Configure Data Collection

Ensure that your systems are configured to collect the necessary logs:

Windows Event Logs: Enable auditing for failed logon events.

Firewall Logs: Ensure that firewall logging is enabled to capture network
access.

AD Logs: Enable auditing for login attempts and account lockouts.

Endpoint Logs: Ensure that endpoint detection and response (EDR)
solutions are deployed and configured to log activities.
2. Define Thresholds

Establish a baseline for normal login attempts and define thresholds for failed
login attempts (e.g., 5 failed attempts within 10 minutes).
3. Set Up Monitoring and Alerts

Use a Security Information and Event Management (SIEM) system like Rapid7
IDR to monitor and correlate events:

Create Rules:

Rule 1: Detect Event ID 4625 (failed logon) and count occurrences
within the defined time frame.


Rule 2: Correlate firewall logs with failed login events to identify
network access patterns.

Rule 3: Monitor AD logs for account lockouts following multiple
failed login attempts.

Rule 4: Analyze endpoint logs for suspicious activities related to
failed login attempts.
Generate Alerts:

Configure Rapid7 IDR to generate alerts when these rules are
triggered.

Set up email or SMS notifications for immediate response.
4. Test the Detection Logic


Simulate Failed Login Attempts:

Perform multiple failed login attempts using a test account within a short
time frame.

Verify that the relevant events (4625) are logged.

Check if the Rapid7 IDR system generates the expected alerts.
Review Logs:

Analyze the event logs to ensure that the detection logic correctly
identifies multiple failed login attempts.

Adjust the correlation rules if necessary to reduce false positives.
5. Fine-Tune and Validate


Refine Rules:

Adjust the thresholds and conditions in the correlation rules based on
testing results.

Include additional context, such as user roles and historical login patterns,
to improve accuracy.
Continuous Monitoring:

Regularly review and update the detection rules to adapt to new threats
and changes in the environment.

Conduct periodic tests to validate the effectiveness of the detection logic.
Example Scenario

User Action: An attacker attempts to log in to a user account multiple times within a
short period.

Log Entries:


Windows logs Event ID 4625 for each failed logon attempt.

Firewall logs show network access from the attacker's IP address.

AD logs record the failed login attempts and any subsequent account lockouts.

Endpoint logs capture any related suspicious activities.
Alert Generation: The Rapid7 IDR system correlates these events and generates an
alert for multiple failed login attempts.
Tools and Resources

Rapid7 IDR Systems: Rapid7 IDR that supports log correlation and alerting.

Windows Event Viewer: To manually review and verify event logs.

Firewall Logs: Access logs from your firewall solution.

AD Logs: Review logs in Windows Event Viewer under "Security".

Endpoint Logs: Access logs from your EDR solution.
Download