Pentest Blog

13. März 2017 – Know-how

Attacking RDP: How to eavesdrop on poorly secured RDP connections

Ein Fachartikel von IT Security Consultant Dr. Adrian Vollmer

"The Remote Desktop Protocol (RDP) is used by system administrators everyday to log onto remote Windows machines. Perhaps most commonly, it is used to perform administrative tasks on critical servers such as the domain controller with highly privileged accounts, whose credentials are transmitted via RDP. It is thus vital to use a secure RDP configuration. [...] This article was written to raise awareness of how important it is to take certificate warnings seriously and to show you how to securely configure your Windows landscape."

Den vollständigen Artikel finden Sie hier.

Den Source Code des Tools zum Artikel ("Seth") finden Sie auf unserem github-Account "SySS Research. Open source IT security software tools and information".

Termine

06.09.2017
Vortrag: Angriffe auf RDP, Dr. Adrian Vollmer, D·A·CH SECURITY 2017, Neubiberberg bei München
12.09.2017 - 13.09.2017
SySS-Schulung – Hack7: Sicherheit und Einfallstore bei Webapplikationen
15.09.2017
SySS-Schulung – Secu5: IT-Recht und Datenschutz für IT-Verantwortliche
19.09.2017 - 20.09.2017
SySS-Schulung – Hack1: Hacking Workshop 1