波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

II. Risk of Remote Desktop in Universities

by JUCC ISTF

/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */

Continuous advancements have been made to improve Remote Desktop security; however, universities still remain as a major target for exploiting Remote Desktop vulnerabilities:

 

1. Lack of security awareness - Although today's user is more IT savvy, lack of security awareness is still one of the leading causes for RDP exploits. Remote access users must be made aware of their security responsibilities.

Awareness training and formally documented policies and procedures can help inform remote access users on important security topics. Such training and policies should include best practices to adhere to when working outside of the office, firewall configuration and password requirements.

 

2. Local Administrative Right - Most of the users are granted with local administrative right on their computers. With the administrative right, users have full control over the configuration and software installation of the computers.

In some cases, best practice of configuration may have been performed on local computers of users by IT department. However, since the local administrative right resides with the users, configurations can be easily modified or reset. Users who are not aware of the risks with using RDP access will be more susceptible to information disclosure attacks and brute force attacks.

 

3. Use of 3rd party software - Users may use 3rd party software readily available on the internet for remote desktop access such as EchoVNC, iTALC, rdesktop, RealVNC Free and TightVNC. There may be vulnerabilities present in these 3rd party softwares which may be exploited by the attacker. For instance, vulnerability has been reported for TightVNC in March 2009, which can be potentially exploited by a malicious hacker to compromise a target computer. User awareness education and regularly update the version and security patch can reduce the adverse effect by the vulnerabilities. This can also be secured by using the highest level of encryption which encrypts the data transmission in both directions by using a 128-bit key.

4. Un-patched Operating Systems - Un-patched Operating Systems leave vulnerabilities exposed and compromises overall security within the system. Windows Remote Desktop, in particular, has had a history of related patches to address several major vulnerabilities. For example, Microsoft released a security patch (MS09-044) in August 2009 to improve the security of Windows Remote Desktop. The patch helped fix a heap-based buffer overflow problem in Remote Desktop Connection that allowed attackers to execute arbitrary code via unspecified parameters.

Administrators should apply the latest patches as soon as possible to mitigate such risks. Patches should be tested on a test server first to avoid any problems or incompatibility issues with the new patch.

 

5. Decentralised PC administration - Due to the large number of students and staff who require remote access to work off-campus, it is difficult for universities to centrally manage the computers requiring remote access. Furthermore, it is not feasible for the IT department to configure each computer for secure remote desktop connection. As a result, universities are susceptible to greater risks as remote access users may have weak configurations or may be unaware to the security risks when using RDP. Computers with weak configuration may be compromised, and used by attackers to perform further attack within the university network.

Universities may consider limiting RDP access to only certain users (e.g. students for courses requiring remote access). Administrators can also consider restricting the range of IPs that can remotely connect to the server. This can be done by configuring the firewall to provide additional access control using user-based authentication or IP restrictions. Alternatively, server configuration can be hardened by using IPSec to filter IPs.

6. External threats - Based on the factors above, universities remain a prime target for external attackers to exploit Remote Desktop vulnerabilities. Below are some examples of attacks that can be performed on universities:
 

 

 

  • Enumeration on server port - Enumeration is the process of gathering information about a target system or network a hacker wants to compromise. Identifying active Terminal Server ports is generally the first step in an attack. One method is to use an internet search engine such as Google to locate the ActiveX authentication form in the default location TSWeb/default.htm. Changing these default parameters and removing these common text strings from your installation can easily "hide" your connection page from this type of search.

    Another common method is to do a port scan for TCP port 3389, which is the default port for RDP. Once an open port is located, the attacker can use their Terminal Server client to connect to the target IP and be prompted for login and password. Hackers can then perform a Brute Force attack and gain access to that Terminal Server. To mitigate this risk, the port number should be changed to a non-standard port for both the Remote Desktop Connection & Remote Desktop Web Connection. Connecting to the Terminal Server using other methods such as VPN, RAS or SSL will also prevent external attacks using this method.
  • Password Guessing Attacks - Password guessing is still the primary method for attacking Terminal Servers. Dictionary based password-cracking tools are available to guess passwords using brute force. It takes advantage of the fact that the Administrator account cannot be locked out for local logins and, therefore, can be cracked through unlimited attempts. This is all done through the encrypted channel, which may allow the attacker to go undetected by Intrusion Detection Systems.

    Important risk-mitigating controls include configuring low account lockout thresholds with manual reset, implementing complex passwords that are changed on a frequent basis, implementing a logon banner, disabling of shared accounts, and renaming the Administrator account. Connecting through a VPN or SSH tunnel, limiting access control by IP or other information, or using 2-factor authentication will add further protection against this threat.
  • Local Privilege Escalation - The interactive rights required for Terminal Server access allows the ability to run privilege escalation and grant the attacker Administrator equivalent privileges. Attackers are utilising the zero-day vulnerabilities to launch blended exploits. This type of vulnerability allows for an interactively logged in user (either at the physical host or using some remote-desktop type of network application) to elevate their privileges to higher-privileged accounts, typically Administrator or SYSTEM. The attack tools are freely available for download on the Internet and other methods use only the tools available in a session. Access control lists and software restriction policies must be carefully designed to protect against this threat. Disabling Active Desktop also prevents a few specific attacks.

Read More [Previous Article]

To be continued in the next issue....

 

大发888真钱注册| 新全讯网carrui| 百家乐官网真人百家乐官网皇冠开户| 百家乐官网平台开户哪里优惠多| 百家乐官网最新分析仪 | 广灵县| 20人百家乐官网桌| 菲律宾太阳网| 百家乐园选百利宫| 百家乐官网手机投注| 百家乐澳门路规则| 真人百家乐官网分析软件是骗局| 老虎机破解方法| 百家乐官网出千工具价格| 娱乐城注册送礼金| 新葡京百家乐现金网| 百家乐官网视频软件下载| 大发888娱乐场下载 df888ylc3403| 揭秘百家乐官网百分之50| 大发888 官方| 海立方百家乐官网的玩法技巧和规则 | 百家乐官网路单资料| 百家乐单机游戏免费下| 百家乐官网一拖三| 自贡百家乐娱乐场开户注册| 南京百家乐官网的玩法技巧和规则 | 澳门百家乐官网怎赌才能赚钱| 龍城百家乐的玩法技巧和规则| 百家乐官网在发牌技巧| 网上赌百家乐被抓应该怎么处理| 大众娱乐城| 百家乐如何写路| 百家乐官网现金游戏注册送彩金| 百家乐过滤工具| 唐朝百家乐官网的玩法技巧和规则| 网络百家乐官网的破解| bet365主页| 大发888真钱娱乐城下载| 百家乐操作技巧| 皇室百家乐的玩法技巧和规则| 艮山坤向 24山|