Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Drakk90/SENTINEL_HONEYPOT

Open more actions menu

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

54 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Sentinel HoneyPot



Steps to Follow

- Main idea is the deploy of a HoneyPot with Visualization in Azure. - Deploy a virtual machine in Azure leaving it unprotected on purpose to be seen by any attacker. - Run PowerShell ISE Script to be used inside the virtual machine to detect attacks. - Log Analytics WorkSpace where we will tell it which is the machine we want to extract the data and where the logs are located. - Run the query to be used on Sentinel within the Analytics Workspace. - Deploy SIEM within Azure Sentinel. - Review of the attacks received in Azure.

Sentinel Honey Pot

Sentinel

[!] Let's go...

As a first step we will create an account within ipgeolocation. Once created, we access the dashboard where the API Keys section will appear, which is what we will copy later to our script inside the virtual machine in Azure. Go to https://app.ipgeolocation.io/login

IPGEOLOCATION

  • If you do not have a Microsoft Azure account go to the following address. https://portal.azure.com/
  • Microsoft will welcome you with an initial credit of $200.00, which is valid for 30 days (Friendly reminder, always remember to delete your labs).

Follow the instructions shown in the following images.

VIRTUALMACHINE

For this exercise remember to set a very strong password with a strong complexity.

VIRTUALMACHINE

Leave the default values until you reach the Networking section.

VIRTUALMACHINE

Once in the networking section, click on the NIC network security group section and select the Advanced option. Click on the create new option.

VIRTUALMACHINE

In the Create a Network Security Group section, enter the name of the group as you want it. In the Incoming Rules section delete the incoming rule you will see there.

VIRTUALMACHINE

It is time to create an inbound rule, for this purpose, in the Destination port ranges section we will place asterisk (*). In the Priority section we will put 1000 and in the Name section we will give the name to the rule as we want it to appear.

VIRTUALMACHINE

This is how our newly created rule should look like.

VIRTUALMACHINE

Finally we will create our virtual machine and we can wait or continue with the next section while it is up.

VIRTUALMACHINE

As mentioned above, we can go step by step or we can go ahead by creating our Log Analytics Workspaces. Once inside we click on the Create button.

VIRTUALMACHINE

We select our Resource group, name our instance and select the same region we have been working in for our example case West US 3.

VIRTUALMACHINE

Here we go, click on the create option and wait.

VIRTUALMACHINE

We take our first steps through Sentinel to start working the environment.

VIRTUALMACHINE

We are heading to Defender Plans. And Check proceed to give check on Servers if is off.

VIRTUALMACHINE

Then we go to Data Collections and click on the option All Events

VIRTUALMACHINE

Look for the Virtual Machines (deprecated) option and double click on it.

VIRTUALMACHINE

We connect our machine.

VIRTUALMACHINE

It is time to connect to our virtual machine, if you do not know the public IP used, go to the virtual machines section where you can get it.

VIRTUALMACHINE

When you log in for the first time, turn off all privacy settings that come with Windows by default. In other words click NO for each of the features and then click Accept.

VIRTUALMACHINE

Go to Windows Firewall and turn everything off.

VIRTUALMACHINE

Download the ipgeo_ps.ps1 file from the following address.

VIRTUALMACHINE

As a last step proceed to run Command Prompt on your local machine and verify that you have PING.

VIRTUALMACHINE

By this time your Log Analytics is already created, go to the Tables section.

VIRTUALMACHINE

Click on the Create option, select the New Custom log (MMA-Based) option.

VIRTUALMACHINE

Enter the name of the log, which is being captured in the virtual machine, the name of the file can be found in the file with extension *.ps1

VIRTUALMACHINE

Select the Operating System and enter the path to the file and the file name, please remember this is Case Sensitive so enter it exactly the same.

VIRTUALMACHINE

Give a name to the custom log.

VIRTUALMACHINE

For this proof of concept we are capturing all events of type 4625, if you go to your Event Viewer inside your virtual machine you will be able to check this.

VIRTUALMACHINE

Wait about 10 minutes while your newly created log is displayed in Analytics and run the log you just created.

VIRTUALMACHINE

Some time ago there was the option to make extracts from a log, but that option disappeared, so now we proceed to do it through a query. You can find the query at the following address.

VIRTUALMACHINE

We go to Microsoft Sentinel and click on the Workbooks section.

VIRTUALMACHINE

We edited our Workbook.

VIRTUALMACHINE

Remove all elements of the workbook.

VIRTUALMACHINE

We paste our previous query.

VIRTUALMACHINE

We enter Map Settings and modify some of our elements taking as reference the image shown below.

VIRTUALMACHINE

We continue with our settings.

VIRTUALMACHINE

Save as.

VIRTUALMACHINE

Set the Autorefresh every 5 minutes.

VIRTUALMACHINE

We wait a few hours and the results will be as shown below.

VIRTUALMACHINE

[!] Disclaimer

This manual is designed to help creating your first project on Azure Sentinel and create your virtual Machine, please remember delete all the created instances on Azure if you want to avoid problems with your monthly billing.

This repository is open source to help others. So if you wish to copy, consider giving credit!

Credits:

Some base codes and templates are from Josh Madakor.

[~] Find Me on :

  • Github

  • Gmail

  • LinkedIn

About

Sentinel Azure and HoneyPot

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
Morty Proxy This is a proxified and sanitized view of the page, visit original site.