Skip to content

5000+ Great Articles

Best Articles & Essays: Interesting Articles to Read Online

  • How to Copy Unselectable Text on Your Screen How-To
  • How to Connect Philips Hue Lights Smart Home
  • How to Backup Your Android Phone Smartphones
  • How To Upgrade To The Latest Ubuntu Linux Tips
  • How to watch Cricket World Cup 2023 online without cable technology
  • How To Hard Reset a Frozen iPhone or Android Device How-To
  • online vat calculator kenya

    A online vat calculator kenya. online vat calculator kenya [insert_php] include ("vat-calculator/index.php");[/insert_php] You are unable to claim VAT

  • Roborock S6 Robot Vacuum Review Smart Home

Defending Against Remote Desktop Protocol Attacks

Posted on October 9, 2020 By bilal 1983 No Comments on Defending Against Remote Desktop Protocol Attacks

As of Feb 5, 2019, shodan.io shows a total of 2,430,941 computers connected to the Internet via Remote Desktop. Of these, 507,957 belong to computers in the United States. This huge number of servers and workstations, shown in the figure below, are increasingly being subjected to cyber attacks.

Defending Against Remote Desktop Protocol Attacks

Since 2016, attacks against Remote Desktop Protocol have been on the rise. In 2018, the Internet Crime Complaints Center (IC3) issued a special security warning regarding Windows Remote Desktop Protocol (RDP).

RDP-related attacks included ransomware, corporate theft, backdoor installation, reversals, and additional attacks. Starting in 2016, black market sales of RDP accounts, including credentials and credentials, have also become available for as little as $ 6 per server.

Obviously, the best way to protect your server is to disable RDP. However, sometimes this is not an option. If your server is one of many that requires Remote Desktop to run, it is imperative to know the types of attacks that can be applied to this protocol and the various techniques available to the engineer to prevent these attacks.

RDP attack methodologies

One of the attacks that a hacker can use is brute force RDP credentials. In this attack, an attacker would scan a range of IP addresses, look for open ports used by RDP (for example, 3389), and finally use a brute force method such as a dictionary attack to try to figure out the password.

Unfortunately, in this type of attack, not only can credentials be lost, but in addition, this brute-force attack can serve as a denial of service to memory or operating system storage due to fullness.

Fortunately, RDP is encrypted over TLS by default. However, an attacker could still use a man-in-the-middle attack to obtain RDP credentials. As with any person in a medium attack, the attacker places himself in a broadcast domain shared by the client or RDP server.

One such methodology uses a Python-based tool called Seth to use ARP spoofing to redirect traffic through an RDP proxy. This allows an attacker to lower the encryption of the connection and extract the credentials in clear text.

Defending Against Remote Desktop Protocol Attacks

As with any listening service, attacks can target vulnerable code. RDP is no exception to the rule. One example of an RDP-specific vulnerability was posted as part of CVE-2018-0976

This CVE notified users of a vulnerability in Remote Desktop Service that made the operating system vulnerable to denial of service when specially crafted packets were sent to a listening server running RDP.

An attacker could also use their RDP connection for additional malicious activities, such as deploying ransomware, installing a backdoor, or even turning around in an environment.

In some cases, attackers can tunnel RDP connections over another protocol, such as SSH, to bypass firewalls and other border defenses.

Defend against RDP attacks

An administrator can use several countermeasures to defend against RDP attacks, and most of them are very simple.

Passwords and Locks

Passwords and security operations

Defending Against Remote Desktop Protocol Attacks

First, it is very important to use strong passwords or two-factor authentication to protect against brute force attacks, and implement a blocking policy. To implement the lockout policy as part of your Windows domain, go to the next setting in the Group Policy Editor.

Computer Configuration Policies Windows Settings Security Settings Account Policies Account Lockout

Set the Account Lockout Threshold to the number of invalid attempts you choose.

Use an alternate port for RDP

Use an alternate port for RDP

To change the port used for RDP, modify the following registry key.

HKEY_LOCAL_MACHINE System CurrentControlSet Control Terminal Server WinStations RDP-Tcp PortNumber

Install the latest Windows and security updates

Install the latest Windows updates and security updates

There are several examples of vulnerabilities in the remote desktop software itself. Since 2002, over 20 security updates and 24 separate CVEs have been released. Here are some examples:

  • MS01-052: Invalid RDP data can cause terminal service to crash
  • MS02-051: A cryptographic flaw in the RDP protocol can lead to information disclosure
  • MS05-041: Vulnerability in Remote Desktop Protocol Could Allow Denial of Service

As with any listening service, it is very important to keep the service up to date and updated to avoid these issues. The complete list of RDP-related vulnerabilities has been posted by Rapid7. It is available at the link below.

https: //blog.rapid7.com/2017/08/09/remote-desktop-protocol-exposore/

Limit RDP sessions by IP address with Windows Firewall

Restrict RDP sessions by IP address using Windows Firewall

Windows Firewall can be used to restrict incoming connections to specific IP addresses only. If you create a firewall rule using the Inbound Rules Wizard, you will see a set of predefined rules available for RDP. Use TCP and UDP rules.

Defending Against Remote Desktop Protocol Attacks

Then you will need to change the properties of your rule to restrict incoming traffic. To do this, go to properties and open the scope tab. On this tab, add allowed IPs to remote. Finally, remember to change the destination port to the port of your choice, if possible.

Defending Against Remote Desktop Protocol Attacks

Enable Network Level Authentication

Turn on network level authentication

In Windows Vista / 2008 and later, there is a new technology introduced in RDP 6.0 that helps in securing RDP connections. This technology is known as network level authentication.

Network layer authentication protects the RDP connection by not establishing a full session until the credentials are authorized. In previous versions of Windows, the login screen loaded before being fully authorized.

This used up resources and opened the RDP server for potential DoS. When configuring RDP, enable NLA by selecting the Allow connections only from computers running Network Level Authenticated Remote Desktop. On Windows 7 and later, this option is set by default.

Defending Against Remote Desktop Protocol Attacks

Limit the number of remote desktop users

Limit remote desktop users

Another security mechanism available to Remote Desktop users is the Group Policy option for Terminal Access. From here you can restrict Remote Desktop to specific users.

We recommend that you use a separate user group for Remote Desktop rather than allowing remote access to all administrative users. To block remote users using Group Policy, do the following:

  1. Click Start ? Programs ? Administrative Tools ? Local Security Policy.
  2. In the Local Policies section, click User Rights. Assignment, go to Allow Terminal Services Logins. Or, allow logins through Remote Desktop Services.
  3. Remove the Administrators group and log out of the Remote Desktop Users group.
  4. Use the System Control Panel to add users to the Remote Desktop Users group.

Use RDP Gateways

Use RDP Gateways

The RDP gateway passes all connections through a single gateway server. This service is built into Windows 2008 and 2012. The gateway will listen for Terminal Services requests over https and then connect the client to the RDP server.

This forces control of all connections through the central node. Instructions for configuring a remote gateway are available at the following link:

https: //dox.microsoft.com/en-us/previus-versions/windovs/it-pro/windovs-server-2008-R2-and-2008/sk770601 (at = sun 11)

Tunnel Remote Desktop Connections over IPSec or SSH

Tunnel remote desktop connections through IPSec or SSH

Additional security measures can be taken by tunneling RDP sessions over IPSec or SSH. One easy way to do this is with putty. First connect to remote ssh server, local to RDP server.

Then set up a putty client ssh session as shown below. Under connection | SSH | Tunnels, you will configure port forwarding from 127.0.0.2:3388 (or a port of your choice) to the IP address and port of the RDP server.

Defending Against Remote Desktop Protocol Attacks

Finally, connect your RDP server to your local address and port. This will redirect the port through the SSH tunnel to the final destination.

Defending Against Remote Desktop Protocol Attacks

Summary

Summary

The number of attacks against remote desktop grows every year. Today, attackers use several RDP attack methodologies, including brute force, man-in-the-middle, and the use of vulnerable code.

Hackers also use RDP as a deployment mechanism for other attacks such as ransomware. Despite the different attack vectors, if implemented correctly, RDP can be used safely.

RDP security techniques include restricting connections to specific IP addresses and users, updating and patching RDP, using RDP gateways, implementing SSH tunneling, using network-level authentication, and hiding the RDP port.

It is also important to use strong passwords, two-factor authentication, and account lockouts. When used correctly, RDP can be a useful tool. This can be done quite safely if all of the above precautions are followed.

Share this:

  • Facebook
  • X
Windows Tags:Defend against RDP attacks, Defending Against Remote Desktop Protocol Attacks, Enable Network Level Authentication, Install the latest Windows and security updates, Install the latest Windows updates and security updates, Limit RDP sessions by IP address with Windows Firewall, Limit remote desktop users, Limit the number of remote desktop users, Passwords and Locks, Passwords and security operations, RDP attack methodologies, Restrict RDP sessions by IP address using Windows Firewall, Summary, Tunnel Remote Desktop Connections over IPSec or SSH, Tunnel remote desktop connections through IPSec or SSH, Turn on network level authentication, Use an alternate port for RDP, Use RDP Gateways

Post navigation

Previous Post: How to Enable Virtualization in Windows 10
Next Post: Configure NGINX Reverse Proxy – Step by Step

Related Posts

  • How to Fix High CPU Usage on Windows 10 Windows
  • How to Share a VPN connection over Wi-Fi on Windows 10 How-To
  • How to Setup VPN on Windows 10 How-To
  • Fix Background Intelligent Transfer Service (BITS) Missing from Services Help Desk
  • How to Join the Metaverse Computer Tips
  • How to Burn CDs, DVDs, and Blu-ray Discs in Windows 10/11 Computer Tips

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • November 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • March 2021
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • December 2019
  • July 2019
  • May 2019
  • April 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018

Categories

  • – 436
  • – 939
  • 1Win AZ Bonuslar, Mobil Tətbiq və Mərc Marketləri – 376
  • 1xBet giriş, güzgü 1 xBet Azərbaycanda rəsmi sayt – 413
  • AI Tools & Guides
  • Amazon Web Services
  • Apple Watch
  • B1 Bet Aviator: Jogo de Cassino Online Tutorial Passo a Passo 202 – 14
  • blog
  • Calculator
  • Computer Tips
  • Cool Websites
  • Dasinmaz emlak elanlari, ev elanlari, ev alqi satqisi, kiraye evler, torpaq, obyekt, bina, bina ev, mənzil, villa, kreditle satilan evler – 814
  • Featured Posts
  • Free Software Downloads
  • Gadgets
  • Gaming
  • General Software
  • Google Software/Tips
  • Hardware
  • Help Desk
  • How-To
  • iOS
  • iPad
  • iPhone
  • islamic Books
  • Linux
  • Linux Tips
  • Mac OS X
  • macOS
  • MS Office Tips
  • Networking
  • Office Tips
  • OS X
  • Product Reviews
  • Reviews
  • Safari
  • Smart Home
  • Smartphones
  • Software Reviews
  • technology
  • text
  • Tools Review
  • Troubleshooting
  • Tutorial
  • Tutorials
  • Uncategorized
  • Urdu Books PDF
  • Web Site Tips
  • Windows
  • Windows 10
  • Windows 7
  • Windows XP Tips
  • Wordpress
  • бонусы до 250%, официальный сайт в Узбекистане – 69
  • Мостбет Уз Ставки на спорт и казино в букмекерской конторе Mostbet Uz – 527
  • ベラジョンカジノの出金方法一覧【2023年 最新】出金限度額・出金の流れ・出金手数料・出金条件 – 466
  • How to Listen to YouTube with Screen OFF (Android & iOS)
  • Youtuber Onlyfans Try Now OnlyFans Sites!
  • How to Access Your Android From Computer Using SSH [No ROOT]
  • Onlyfans Cuckold Wife – Try Online Beautiful-Nudes
  • How to Convert Video on Android with FFmpeg Using Termux
DMCA.com Protection Status

Recent Posts

  • How to Automatically Mute your Mac When it Wakes Up From Sleep
  • Get Android O Custom Navigation Bar on any Android Running Nougat [No Root]
  • How to Access Your Android From Computer Using SSH [No ROOT]
  • How to Convert Video on Android with FFmpeg Using Termux
  • Now Upload Photos To Instagram From Computer Without any Software

Recent Comments

  1. Instagram stories not working/loading? Try These 9 Fixes on Can’t update PS5 system software? Try These 10 Fixes
  2. How to Link to a Specific Part Of A Webpage & Share it on Best PDF to Word Converter Online (Free Without Email)
  3. See What’s Taking up Space on Your Hard Drive on 7 best 3D scanning apps for Android and iOS
  4. Make your Devices Read Out Text, With Text to Speech on 9 Best 10K Running Apps for 2023
  5. How to Find your Router’s IP Address on How to Fix Apple CarPlay Not Working? 7 Possible ways
  • How to Use MSCONFIG in Windows Cool Websites
  • how to add contacts in whatsapp android Smartphones
  • How to Listen to YouTube with Screen OFF (Android & iOS) How-To
  • How to Prevent Your Mac From Sleeping OS X
  • OTT Explains : What Did The First Internet Browser Look Like? technology
  • 5 Free Alternatives to Google Analytics Reviews
  • Apple TV Vs Amazon Fire Stick: how Is Better for Streaming? Gadgets
  • Instantly Remove Backgrounds from Images using AI How-To

Copyright © 2023 How To Blog.

Powered by PressBook News WordPress theme

Go to mobile version