piratepatrol
asked on
Is Remote Desktop Safe?
Hello my friends,
I was just wondering if using Remote Desktop in Windows Server 2003 is completely safe. Can I Remote Desktop to another computer for long periods of time without having to worry about naughty hackers getting hold of my system or putting viruses into it?
Thank you so much,
Jazon Samillano
<< URL removed by Humeniuk - page editor, see https://www.experts-exchange.com/help.jsp#hi106 >>
I was just wondering if using Remote Desktop in Windows Server 2003 is completely safe. Can I Remote Desktop to another computer for long periods of time without having to worry about naughty hackers getting hold of my system or putting viruses into it?
Thank you so much,
Jazon Samillano
<< URL removed by Humeniuk - page editor, see https://www.experts-exchange.com/help.jsp#hi106 >>
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Thank you so much
Rdp just got less secure...
Cain & Abel v2.7.3 released
New features:
- RDPv4 session sniffer for APR
Cain can now perform man-in-the-middle attacks against the heavy encrypted Remote Desktop Protocol (RDP), the one used to connect to the Terminal Server service of a remote Windows computer. The entire session from/to the client/server is decrypted and saved to a text file. Client-side key strokes are also decoded to provide some kind of password interception. The attack can be completely invisible because of the use of APR (Arp Poison Routing) and other protocol weakness.
-rich
Cain & Abel v2.7.3 released
New features:
- RDPv4 session sniffer for APR
Cain can now perform man-in-the-middle attacks against the heavy encrypted Remote Desktop Protocol (RDP), the one used to connect to the Terminal Server service of a remote Windows computer. The entire session from/to the client/server is decrypted and saved to a text file. Client-side key strokes are also decoded to provide some kind of password interception. The attack can be completely invisible because of the use of APR (Arp Poison Routing) and other protocol weakness.
-rich
ASKER
Oh my God, this sucks! Is it gon'na be up to Microsoft to come up with a patch against this?
It's hard to patch against properly, in fact M$ has patched this one before, and this arp posioning attack would work best on the lan, or if you gathered enough information about an internet host, you could concieveably do this with some sucess on internet host's. It does require you to have posioning setup prior to a TS/RD session. This isn't much different than the SMBRelay tool's that have been around for some time. Read the PDF on their site for more info, again you'd have to be posioning prior for the attack to work.
http://www.oxid.it/downloads/rdp-gbu.pdf
-rich
http://www.oxid.it/downloads/rdp-gbu.pdf
-rich
ASKER