<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Brute force IPS/IDS on RDP custom ports in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135636#M20463</link>
    <description>&lt;P&gt;I think it's worth a TAC case. I couldn't find any SRs matching this one from the past.&lt;/P&gt;
&lt;P&gt;From the digging I did, it seems the port number is controlled via a macro in INSPECT code.&lt;/P&gt;
&lt;P&gt;If nothing else it could be an opportunity for a RFE.&lt;/P&gt;</description>
    <pubDate>Mon, 06 Dec 2021 14:42:14 GMT</pubDate>
    <dc:creator>mcatanzaro</dc:creator>
    <dc:date>2021-12-06T14:42:14Z</dc:date>
    <item>
      <title>Brute force IPS/IDS on RDP custom ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135492#M20417</link>
      <description>&lt;P&gt;We have numerous clients that have custom port numbers translated to their Terminal Servers for RDP connection.&lt;/P&gt;&lt;P&gt;I am using a Kali tool, Hydra, to brute force attack a customer RDS server. Normally, with our Sophos, the firewall will detect the very high and unusual username/password attempts and block the connection.&lt;/P&gt;&lt;P&gt;We have the STRICT SECURITY auto policy enabled (we also tested the CLOUD policy) and neither can detect the repeated RDP log attempts.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Can you please help me understand why the Check Point isn’t behaving like our Sophos XGS, blocking the obvious brute force attack?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Here is an example NAT rule that translates the traffic to the customer’s RDS.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BrianD_0-1638547140484.png" style="width: 869px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14446i8BAE8706C4DB4121/image-dimensions/869x33?v=v2" width="869" height="33" role="button" title="BrianD_0-1638547140484.png" alt="BrianD_0-1638547140484.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Here is a preview of the firewall allowing the many hundred of connections from my Kali hydra attack.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled-2.jpg" style="width: 965px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/14448i6C42866523146C56/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled-2.jpg" alt="Untitled-2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 19:17:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135492#M20417</guid>
      <dc:creator>BrianD</dc:creator>
      <dc:date>2021-12-03T19:17:04Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force IPS/IDS on RDP custom ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135497#M20418</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I’ll see if I can lab something out this weekend on this one.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I prefer crowbar over hydra for RDP but I can test both.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 22:42:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135497#M20418</guid>
      <dc:creator>mcatanzaro</dc:creator>
      <dc:date>2021-12-03T22:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force IPS/IDS on RDP custom ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135498#M20419</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 22:46:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135498#M20419</guid>
      <dc:creator>BrianD</dc:creator>
      <dc:date>2021-12-03T22:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force IPS/IDS on RDP custom ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135520#M20434</link>
      <description>&lt;P&gt;Hi Brian,&lt;/P&gt;
&lt;P&gt;I tested this out and to my surprise it seems the relevant signatures only detect this behavior with the default port of 3389.&lt;/P&gt;
&lt;P&gt;I tested cloning the remote desktop services object and giving it a custom port. I also configured HTTPSi for the rdp traffic.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I believe this one will need a SR for an official statement on if this is expected behavior or not.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Other thoughts would be possibly creating a custom snort rule but that can get tricky with connection limiting. Rate limiting (fwaccel dos) could also maybe be an option but there could be risk of dropping legitimate traffic or not blocking all brute force attempts depending on tuning.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Something else to mention to your client would be to explore other methods of access that don’t require RDP to be open to the world.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Michael&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Dec 2021 01:13:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135520#M20434</guid>
      <dc:creator>mcatanzaro</dc:creator>
      <dc:date>2021-12-05T01:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force IPS/IDS on RDP custom ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135631#M20462</link>
      <description>&lt;P&gt;Sounds like we're going to have to resort to using EvlWatcher to auto block brute force attacks. What a shame - maybe the TAC team can work some magic?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2021 13:58:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135631#M20462</guid>
      <dc:creator>BrianD</dc:creator>
      <dc:date>2021-12-06T13:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: Brute force IPS/IDS on RDP custom ports</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135636#M20463</link>
      <description>&lt;P&gt;I think it's worth a TAC case. I couldn't find any SRs matching this one from the past.&lt;/P&gt;
&lt;P&gt;From the digging I did, it seems the port number is controlled via a macro in INSPECT code.&lt;/P&gt;
&lt;P&gt;If nothing else it could be an opportunity for a RFE.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2021 14:42:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Brute-force-IPS-IDS-on-RDP-custom-ports/m-p/135636#M20463</guid>
      <dc:creator>mcatanzaro</dc:creator>
      <dc:date>2021-12-06T14:42:14Z</dc:date>
    </item>
  </channel>
</rss>

