![]() |
1
Int100 18 天前 via iPhone
建议全阻断,用 vpn 连进去.
|
![]() |
2
wtks1 18 天前
用 IP 安全策略试试
|
![]() |
3
geelaw 18 天前
第一个思路是确认你看到的确实是 RDP 登录尝试。Logon Type 是 10 (RemoteInteractive) 吗? Source Port 是 3389 吗?
|
![]() |
4
MrLonely OP @geelaw
好像并不是,Logon Type 是 3 。Source Port 也不是 3389. 但是这里的 Source Port 难道不是对方发起连接的 Port 吗?如何查看这个 event 本身发生的 port 呢? Log Name: Security Source: Microsoft-Windows-Security-Auditing Date: 2/3/2025 5:15:20 AM Event ID: 4625 Task Category: Logon Level: Information Keywords: Audit Failure User: N/A Computer: WIN-PJLJ74N60AR Description: An account failed to log on. Subject: Security ID: NULL SID Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 Account For Which Logon Failed: Security ID: NULL SID Account Name: Administrator Account Domain: WORKGROUP Failure Information: Failure Reason: Unknown user name or bad password. Status: 0xC000006D Sub Status: 0xC000006A Process Information: Caller Process ID: 0x0 Caller Process Name: - Network Information: Workstation Name: WIN-OOJO0024I1F Source Network Address: 178.18.206.234 Source Port: 60831 Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): - Key Length: 0 This event is generated when a logon request fails. It is generated on the computer where access was attempted. The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe. The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network). The Process Information fields indicate which account and process on the system requested the logon. The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases. The authentication information fields provide detailed information about this specific logon request. - Transited services indicate which intermediate services have participated in this logon request. - Package name indicates which sub-protocol was used among the NTLM protocols. - Key length indicates the length of the generated session key. This will be 0 if no session key was requested. Event Xml: <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event"> <System> <Provider Name="Microsoft-Windows-Security-Auditing" Guid="{54849625-5478-4994-a5ba-3e3b0328c30d}" /> <EventID>4625</EventID> <Version>0</Version> <Level>0</Level> <Task>12544</Task> <Opcode>0</Opcode> <Keywords>0x8010000000000000</Keywords> <TimeCreated SystemTime="2025-02-03T10:15:20.1270526Z" /> <EventRecordID>134689</EventRecordID> <Correlation ActivityID="{01d33ee7-74ab-0006-fc3e-d301ab74db01}" /> <Execution ProcessID="768" ThreadID="6240" /> <Channel>Security</Channel> <Computer>WIN-PJLJ74N60AR</Computer> <Security /> </System> <EventData> <Data Name="SubjectUserSid">S-1-0-0</Data> <Data Name="SubjectUserName">-</Data> <Data Name="SubjectDomainName">-</Data> <Data Name="SubjectLogonId">0x0</Data> <Data Name="TargetUserSid">S-1-0-0</Data> <Data Name="TargetUserName">Administrator</Data> <Data Name="TargetDomainName">WORKGROUP</Data> <Data Name="Status">0xc000006d</Data> <Data Name="FailureReason">%%2313</Data> <Data Name="SubStatus">0xc000006a</Data> <Data Name="LogonType">3</Data> <Data Name="LogonProcessName">NtLmSsp </Data> <Data Name="AuthenticationPackageName">NTLM</Data> <Data Name="WorkstationName">WIN-OOJO0024I1F</Data> <Data Name="TransmittedServices">-</Data> <Data Name="LmPackageName">-</Data> <Data Name="KeyLength">0</Data> <Data Name="ProcessId">0x0</Data> <Data Name="ProcessName">-</Data> <Data Name="IpAddress">178.18.206.234</Data> <Data Name="IpPort">60831</Data> </EventData> </Event> |
![]() |
5
geelaw 18 天前
@MrLonely #4 有没有一种非常简单的可能,就是这件事情和 RD 没有任何关系,并且你看到的 60831 端口就是尝试登录的端口,呢?
参考 https://learn.microsoft.com/en-us/windows-server/identity/securing-privileged-access/reference-tools-logon-types 发生 Logon Type = 3 (Network) 的情况很多 |
6
fuzzsh 18 天前 via Android
看下网卡是什么类型的网络,新建端口 3389 的策略勾上对应网络,缺省带来的貌似是分几个程序,不是端口
|
7
yinmin 18 天前 via iPhone
是 vps 吧? 你在云服务商的网站上看看有没有网络防火墙,用云服务商的防火墙做限制。windows 内置防火墙很容易出幺蛾子。实在要用 windows 内置防火墙,自己创建新的入站规则(例如:80 、443 、3389 等),然后把所有内置入站允许的规则都限制为“本地子网”(规则属性-作用域-远程 ip 地址-添加-预定义计算机集:本地子网)
|
![]() |
8
realpg 18 天前
@MrLonely #4
都写的多明白了 NTLM 认证 跟 RDP 没有一分钱关系 你这是境外的 vps 吗? 国内的一级 ISP 保护的太好了,几乎丢掉了广域网下跨 BRAS 的全部常规使用 NTLM 验证的协议 所以很少人知道这些东西了 除非是 2004 年以前就在玩 hacker 技术的才熟悉这些 |
![]() |
9
kk2syc 18 天前
|
![]() |
10
MrLonely OP |
![]() |
11
MrLonely OP 贴个解决方案吧。ChatGPT 给的答案试过了,不太准确。Claude 给的就测试有效。
Disable NTLM authentication if not needed: Open Group Policy Editor (gpedit.msc) Navigate to: Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options Find "Network security: Restrict NTLM: Incoming NTLM traffic" Set it to "Deny all account" After this, force a policy update by running: gpupdate /force |
12
cnbatch 17 天前
NTLM 其实也不算罕见的,公司环境 Windows 活动目录的各种交互都会用到,比如用 Windows 账号免登录内网服务就有可能用到 NTLM 。
SMB 文件共享就更有可能使用着 NTLM 。 |
13
billccn 17 天前
NTLM 关掉无法登陆是因为强制 Network level authentication(NLA)还开着,但是你的服务器只有 NTLM 一种身份验证方式。你把 NLA 不再强制就可以用 RDP 交互登陆,不再需要 NTLM ,还可以把 SMB 和 RPC 相关的端口关掉。
交互登陆有一个弊端就是别人不需要密码就能连上登录的画面,如果你的 IP 白名单很宽,可能被 DDoS 或者 0day 。 建议自己搭一个 VPN 或者利用新版 Windows 自带的 SSH 服务做端口转发,然后把 RDP 相关端口都放到内网。( SSH 服务只开密钥认证,开放密码登录的话一样也会被扫。) |
![]() |
14
realpg 17 天前
|