<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking RDWeb brute force attempts in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-rdweb-brute-force-attempts/m-p/595022#M118427</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we have a customer that's under a slow brute force attempt by a persistent party. Blocked their IP several times, but they switched and even started using multiple addresses at the same time now.&lt;/P&gt;
&lt;P&gt;It's doing around 3 to 4 attempts per second per IP on the remote desktop gateway to brute force the passwords. As they seem to possess several valid user accounts these users accounts get locked out which is highly annoying for the users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have now added the certificate to the PA and created a decrypt policy. Unfortunately at this stage I'm not sure how they were attempting this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically there are 2 ways I've identified so far. The webserver is presenting a webpage with a form on the /RDWeb website. This form unfortunately doesn't seem to adhere to any HTTP standards for authentication. Failing authentication on it doesn't result in any 401 errors from the webserver, it doesn't seem to follow any HTTP authentication protocol either.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So far generic brute force settings aren't picking up on it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The other is the remote desktop gateway protocol itself. Made a loop with xfreerdp that calls something like this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;xfreerdp /gateway:g:my.rdgateway.tld,u:myuser,d:DOMAIN,p:verybad /v:my.backendserver.local /u:myuser@domain.tld&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And that works fine.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Have a vulnerability protection profile attached with exceptions for:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;40006 HTTP: User Authentication Brute Force Attempt&lt;BR /&gt;40021 MS-RDP Brute Force Attempt&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;40030 HTTP NTLM Authentication Brute Force Attack&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;40031 HTTP Unauthorized Brute Force Attack&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With the settings modified to 5 per 10 minutes and action block-ip for 1 hour.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That works fine for the xfreerdp way thus, which does RPC over HTTP calls, but it doesn't do anything at all for the /RDWeb form via browser/POST unfortunately and no clue how to get that blocked as it happily returns 200 with a message in the page that authentication failed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Anyone have any ideas on how to block that?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Aug 2024 16:26:50 GMT</pubDate>
    <dc:creator>F.vanSteen</dc:creator>
    <dc:date>2024-08-15T16:26:50Z</dc:date>
    <item>
      <title>Blocking RDWeb brute force attempts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-rdweb-brute-force-attempts/m-p/595022#M118427</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we have a customer that's under a slow brute force attempt by a persistent party. Blocked their IP several times, but they switched and even started using multiple addresses at the same time now.&lt;/P&gt;
&lt;P&gt;It's doing around 3 to 4 attempts per second per IP on the remote desktop gateway to brute force the passwords. As they seem to possess several valid user accounts these users accounts get locked out which is highly annoying for the users.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have now added the certificate to the PA and created a decrypt policy. Unfortunately at this stage I'm not sure how they were attempting this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basically there are 2 ways I've identified so far. The webserver is presenting a webpage with a form on the /RDWeb website. This form unfortunately doesn't seem to adhere to any HTTP standards for authentication. Failing authentication on it doesn't result in any 401 errors from the webserver, it doesn't seem to follow any HTTP authentication protocol either.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So far generic brute force settings aren't picking up on it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The other is the remote desktop gateway protocol itself. Made a loop with xfreerdp that calls something like this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;xfreerdp /gateway:g:my.rdgateway.tld,u:myuser,d:DOMAIN,p:verybad /v:my.backendserver.local /u:myuser@domain.tld&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And that works fine.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Have a vulnerability protection profile attached with exceptions for:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;40006 HTTP: User Authentication Brute Force Attempt&lt;BR /&gt;40021 MS-RDP Brute Force Attempt&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;40030 HTTP NTLM Authentication Brute Force Attack&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;40031 HTTP Unauthorized Brute Force Attack&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With the settings modified to 5 per 10 minutes and action block-ip for 1 hour.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That works fine for the xfreerdp way thus, which does RPC over HTTP calls, but it doesn't do anything at all for the /RDWeb form via browser/POST unfortunately and no clue how to get that blocked as it happily returns 200 with a message in the page that authentication failed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Anyone have any ideas on how to block that?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 16:26:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-rdweb-brute-force-attempts/m-p/595022#M118427</guid>
      <dc:creator>F.vanSteen</dc:creator>
      <dc:date>2024-08-15T16:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking RDWeb brute force attempts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/blocking-rdweb-brute-force-attempts/m-p/595024#M118428</link>
      <description>&lt;P&gt;This is with the xfreerdp method, the one mstsc will also be using. But no fix for /RDWeb so far.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_20240815_182953.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61541i146AF8088E3A49F3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot_20240815_182953.png" alt="Screenshot_20240815_182953.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 16:33:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/blocking-rdweb-brute-force-attempts/m-p/595024#M118428</guid>
      <dc:creator>F.vanSteen</dc:creator>
      <dc:date>2024-08-15T16:33:48Z</dc:date>
    </item>
  </channel>
</rss>

