Skip to content

PwnSec's

Field Notes From Around The Internet

Portfolio View Theme By Wp Theme Space
Bad Actorscredential stuffing attackdictionary attackforensic-analysisremote login attack

I Created A Honeypot Using Windows 10 Remote Desktop, Then Russians Attacked Me

Posted on April 14, 2022January 3, 2024 by Pwnsec

Do you want to know how dangerous it is to set up your home computers to allow remote logins? Maybe you followed one of those tech Youtube videos that headlines with “How To Setup Remote Desktop Connection on Windows 10″… STOP it’s a bad idea and let me tell you why!

Don’t follow these tutorials unless you are only doing it locally and not over the open internet

Months ago around November of 2021 it was late at night and I had one of those fun bad ideas. I decided to setup a honeypot at home on my personal gaming pc in a safe manner. What’s a honeypot? A honeypot is a computer or computer system that you connect to the internet and knowingly open it up to bad actors so they can compromise your computer. Basically login to your computer without your permission or hack it if you want to sound cool.

Shi, Leyi & Li, Yang & Feng, Haijie. (2018). Performance Analysis of Honeypot with Petri Nets. Information. 9. 245. 10.3390/info9100245.

The idea is you dangle this piece of the pie aka your vulnerable computer in front of hackers so that they think there is something of value to them inside. Imagine a corporate network where the computers hold financial account numbers, social security numbers, or personal health information. The honeypot makes them think that’s what they may get if they break in but in reality you set up the trap just for them. You are silently waiting for them to attack and are ready to catch them in the act while recording their every move.

Bad actor ip Addresses Using Credential Stuffing Attack 94.232.42.119 and 45.9.20.26

I really didn’t think this idea would pan out but I was wrong. Russian ip’s started hammering my gaming pc on November 13th of 2021 with a credential stuffing attack. I set up the trap within my Fortinet firewall with a new subnet. This new subnet was setup with an access policy that would only allow my gaming pc access to the internet and only one inbound connection to remote desktop services from the internet via port 1125. Segmentation was key!

Most windows operating systems have a remote desktop feature

If you use windows you may have heard of Remote Desktop. This feature allows you to set up your personal computer at home to be logged into from a different computer at a different location. As seen in the screenshot above, all you have to do is toggle an on and off switch and you are ready to use remote desktop. With remote desktop on, you can type in your computers private ip address like 10.10.1.20:3389 and login to your computer. It’s that simple but also relatively safe if you don’t allow this feature to be accessed from the internet. Something those Youtube videos we spoke of earlier tell you to do.

Example of what it looks like trying to login to a computer that has remote desktop services enabled on a local private network

Above you see that I am using a program called Remote Desktop Connection, it’s how you connect to Remote Desktop Services. You will see the Remote Desktop Connection program ask for a computer name/ip address, the username of the person to login as, and then it would ask the password of the user. What is the number 3389? Port 3389 is the default port used by RDP that Microsoft set. Imagine your ip address is your homes address and a port number is the entrance sign that says “Bathroom” to your bathrooms door within your house. An example is if someone from the internet goes to your ip address and also points to port number 3389 it tells the computer “hey someone is trying to use this Microsoft RDP Service” or in this example your bathroom and let’s them proceed to try and get in or login in this case.

Now it’s not that simple to open up your computer and expose it to the internet. Just turning on Remote Desktop alone in Windows settings isn’t going to let you get hacked. You have to open up port 3389 in your home’s router to allow access from the internet into your computer. I won’t dig too deep into this part but in the screenshot above you see the numbers 1125. That was me changing Microsoft’s default port to remote desktop services from 3389 to 1125. Why did I do this? To bait a bad actor. I wanted someone to think why I wasn’t using the default Microsoft port for Remote Desktop Services 3389. Make the hacker think “maybe this person is saavy and of some importance”.

Notice the different names per login attempt via remote login and the different ip address per each attempt. These bad actors were pretty well prepared to take over this computer as fast as they could.

It worked. After some days of my computers Remote Desktop Services being exposed to the internet via port 1125, it got found. It started getting attacked by none other than… You got it. Russian ip addresses. The beauty of the internet is that there is always evidence of everything that has happened. You can delete files, delete logs, delete delete delete. There will always be artifacts and digital forensic evidence left of what was done on most technology devices with operations systems.

Notice the time stamps. Each audit failure is an attempt to login to my computer with a different username.

The bad actors Russian ip addresses kept pounding my gaming pc with around 8-15 login attempts per second and each of those login attempts has a different login name credential. This is what we call a credential stuffing attack where the hacker is using a database with well known leaked passwords and leaked usernames from past successful attacks. The login names ranged from Caisse, VisionOnline, Thao.NS, StacyB. Amazon1 and more.

Notice the Logon Type: 3 section. That logon type identifier tells me that it was a remote attempt to logon.

My SIEM virtual machine I setup for this project noticed the unusual behavior and notified me of these attempts to break into the system. I kept an eye on the attack until I gathered enough intelligence and began an incident response and remediation plan to get some practice in.

Moral of the story. The internet can be scary if you follow Youtube tutorials.

Post navigation

Previous: CryptoCurrency Phising Email Analysis
Next: Quick Fix Wazuh OVA Kibana Server Is Not Ready Yet, Fix Wazuh ElasticSearch Service Error After Reboot

Recent Posts

  • Tools I Used To Pass OSCP
  • Hack The Box – Busqueda Walkthrough Details
  • Proving Grounds – MedJed Walkthrough
  • How Local and Remote File Inclusion Is Dangerous
  • Hack The Box – Devel Walkthrough Details
© 2026 PwnSec's
Proudly powered by WordPress | Portfolio View by Wp Theme Space.