Page cover

Bruteforce BTLO

RDB Brute Force Attack logs Analysis

1- First Question Talking about the number of the login Failure simply I use find and count the events use 'Administrator' word because the attacker was trying to brute force to achieve the account Password

2-Here simply is asking for the username and it`s easy the same word we use for the find by the way

3- Here he was asking for the reason and after check the event file it`s the wrong password or administrator not defined but i think its a good trick from the active directory editor its Must be a found a administrator account but if the reason was only bad password the attacker is now sure that he skip the half way and start password spraying not bruteforce

4-Here he was asking for the event id and it`s also in the event file

5- Simply the source ip can easily detected from the file

6- I use abuse dp to detect the country for the attacker

7- For detect the smallest and the largest port i made a small Script to easy determine the numbers Let's extract the relevant source port numbers from the document and find the smallest and largest values.


import re

file_path = '/mnt/data/BTLO_Bruteforce_Challenge.txt'

with open(file_path, 'r') as file:
    content = file.read()

source_ports = re.findall(r'Source Port:\s+(\d+)', content)

source_ports = [int(port) for port in source_ports]

min_port = min(source_ports)
max_port = max(source_ports)

min_port, max_port

Thanks for Reading

Last updated