Link to home
Start Free TrialLog in
Avatar of piratepatrol
piratepatrolFlag for United States of America

asked on

Is Remote Desktop Safe?

Hello my friends,

I was just wondering if using Remote Desktop in Windows Server 2003 is completely safe.  Can I Remote Desktop to another computer for long periods of time without having to worry about naughty hackers getting hold of my system or putting viruses into it?

Thank you so much,


Jazon Samillano
<< URL removed by Humeniuk - page editor, see https://www.experts-exchange.com/help.jsp#hi106 >>
SOLUTION
Avatar of Lee W, MVP
Lee W, MVP
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
ASKER CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of piratepatrol

ASKER

So I can Remote Desktop to a server for hours and hours and not have to worry about a hacker slipping a virus into my server?  Also, the password is sent from my keyboard to the server with encryption, right?
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Thank you so much
Rdp just got less secure...
Cain & Abel v2.7.3 released
New features:
- RDPv4 session sniffer for APR
Cain can now perform man-in-the-middle attacks against the heavy encrypted Remote Desktop Protocol (RDP), the one used to connect to the Terminal Server service of a remote Windows computer. The entire session from/to the client/server is decrypted and saved to a text file. Client-side key strokes are also decoded to provide some kind of password interception. The attack can be completely invisible because of the use of APR (Arp Poison Routing) and other protocol weakness.
-rich
Oh my God, this sucks!  Is it gon'na be up to Microsoft to come up with a patch against this?
It's hard to patch against properly, in fact M$ has patched this one before, and this arp posioning attack would work best on the lan, or if you gathered enough information about an internet host, you could concieveably do this with some sucess on internet host's. It does require you to have posioning setup prior to a TS/RD session. This isn't much different than the SMBRelay tool's that have been around for some time. Read the PDF on their site for more info, again you'd have to be posioning prior for the attack to work.
http://www.oxid.it/downloads/rdp-gbu.pdf
-rich