Penetration Testing mailing list archives
Re: Securing RDP - Is it possible?
From: Mark Owen <mr.markowen () gmail com>
Date: Tue, 14 Apr 2009 10:51:37 -0400
On Tue, Apr 14, 2009 at 4:27 AM, Chip Panarchy <forumanarchy () gmail com> wrote:
Hello Is Secure RDP an impossibility? I am now working (WOOT) and they seem to use entirely RDP, almost no VNC... This, by my reckoning would make the network most insecure. Would you agree? Or is it possible to Secure RDP? Thanks in advance for sharing ideas on this matter, Panarchy
It is difficult to say if RDP makes your network insecure without knowing more about the architecture. However, in a properly deployed environment, RDP sessions are a minimal threat against network security; and in most instances, less of a threat than a VNC deployment. Ensure that a firewall is in place between the Internet and RDP servers and only forward the required ports (TCP 3389) if configured for access from the Internet. Standard measures for securing your internal network against the public should be set in place and logging should be enabled for any inbound connections to your servers. In addition, if you prefer the false sense of security through obscurity, you may change RDP's listening port from 3389. RDP sessions are RC4 encrypted but by default use the maximum key supported by the client. Legacy clients may encrypt sessions with smaller keys and therefore, the RDP servers should be set to require 128-bit encryption. Additional measures to take involve granting access to those who only need it, restricting the total number of concurrent users that may connect, and setting a limit for the duration a user may be connected. There are many more options available to take to secure it even further, but this should be a good start to follow. Here's a good link with a few more details: http://www.windowsecurity.com/articles/Windows_Terminal_Services.html If that is not enough, you may wish to look into utilizing certificates, a VPN, and/or SSH tunneling. Mark Owen ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- RE: Securing RDP - Is it possible?, (continued)
- RE: Securing RDP - Is it possible? Craig S. Wright (Apr 15)
- Message not available
- Re: Securing RDP - Is it possible? David Glosser (Apr 15)
- RE: Securing RDP - Is it possible? Craig S. Wright (Apr 16)
- Re: Securing RDP - Is it possible? Parity (Apr 14)
- Re: Securing RDP - Is it possible? Adriel T. Desautels (Apr 14)
- Re: Securing RDP - Is it possible? David Glosser (Apr 14)
- RE: Securing RDP - Is it possible? Ben Little (Apr 14)
- Re: Securing RDP - Is it possible? Parity (Apr 15)
- RE: Securing RDP - Is it possible? Lay, James (Apr 14)
- RE: Securing RDP - Is it possible? Harris, Michael C. (Apr 14)
- RE: Securing RDP - Is it possible? Ben Little (Apr 14)
- Re: Securing RDP - Is it possible? Mark Owen (Apr 14)
- Securing RDP - Is it possible? christopher . riley (Apr 14)
