ad-honeypot-autodeploy: RDP Honeypot fully automatically
Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.
Used for painlessly set up a small Windows Domain from scratch automatically (without user interaction) for the purpose of RDP Honeypot testing.
Features a Domain Controller, a Desktop Computer and a configured Graylog server for logging the actions of the bad guys.
Automatic deployment phases
Packer: download the necessary install media and setup the automated base virtual machine images unattended.
Terraform: provision the libvirt virtualization infrastructure (network + virtual machines) using the packer-prepared virtual machine images.
Ansible: Configure the infrastructure (DC, Desktop, Graylog) automatically, without user interaction.
After going through the Packer+Terraform+Ansible pipeline, the configured Windows Domain should be up and running, you could attach the RDP service of the Desktop to the public internet, and let’s monitor the events through the Graylog.
Features of the running system are:
- a Windows Server 2016 as a Domain Controller
- a Windows 10 Desktop (version 2004) as a Domain Computer
- a Graylog 3.3 (Open Source edition) running as a Log Collector on Ubuntu 18.04 LTS
- Using VirtIO drivers for best performance
- Enabled RDP and WinRM Services
- Populated Windows Active Directory with random users
- Sysmon (from Windows Sysinternals) installed and running on Domain Computers
- NXLog Collector running a Domain Computers and forwarding logs to Graylog
- Configured Graylog GeoIP lookup table and pipeline for IP addresses (useful for showing a map of invalid RDP login attempts)
- Graylog World Map of RDP attacks