Post

Cybersecurity SIEM Honeypot Project

Set up your own cyber honeypot and monitor attacks in Microsoft Sentinel (SIEM)

Cybersecurity SIEM Honeypot Project

Introduction

The idea behind this project is to create a VM in Microsoft Azure that serves as a honeypot for attackers. This VM is running Windows 10 Pro with all of its ports open and Windows Defender Firewall turned off. As threat actors try to brute force their way into the VM through RDP atacks, the Windows Event Viewer logs for failed login attempts are parsed for the attacker’s geographic information. Using the ipgeolocation.io API, the attacker’s IP is mapped to a general location on the map (city, country) and this data is then uploaded to a table in Microsoft’s Log analytics workspace. Lastly, the data is queried in a workbook in Microsoft Sentinel and graphed on a map.

Tools and Resources

  • Microsoft Sentinel: Graph and analyse security events
  • Microsoft Defender for Cloud: For gathering logs from the VM
  • Microsoft Log Analytics Workspace: Store and organize logs
  • Microsoft Azure VM: Serves as the honeypot
  • PowerShell: A script for converting IP’s, from failed RDP attacks, into useful geolocation
  • KQL: Query language used to structure data from logs
  • ipgeolocation.io: Provides the API for mapping IP to geolocation

Attacks Graphed on a World Map

Failed RDP Attacks Graphed

Most Common Account Names Used During RDP Attacks

Failed RDP Attacks Bar Graphed

This post is licensed under CC BY 4.0 by the author.