There's only been one reported successful attack against Server 2003's RDP, and that was because of Korean-language add-on. Obviously, if you have weak passwords, all bets are off no matter what access method you choose.Originally posted by: spyordie007
...However mounting a successful man in the middle attack against RDP requires a fairly high level of knowledge by someone who has singled you out for attack. Since this is an unmanaged environment I feel compelled to point out that if someone knowledgeable really has it in for you it's most likely that they would be able to perform an easier attack than this (lowest-hanging fruit)....
This is an interesting discussion because I've used RDP and terminal services for a long time, and find port scans against port 3389 and 1494 (Citrix ICA) to be non-existent. If there are hackers looking to get in, they sure as heck aren't interested in bashing logon passwords with those services.
Bad analogy. It takes a lot more technical savvy and knowledge to break into a computer than it does to walk into an unlocked house. Plus, an unlocked door would be more comparable to having Remote Desktop set up with NO login required.. immediate admin access.
Originally posted by: Nothinman
Bad analogy. It takes a lot more technical savvy and knowledge to break into a computer than it does to walk into an unlocked house. Plus, an unlocked door would be more comparable to having Remote Desktop set up with NO login required.. immediate admin access.
But the point is still the same, you don't wait until after an attempt is made to secure something, right?