• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Sniffing traffic going through Remote Desktop

jtvang125

Diamond Member
I know you can determine the IP of the host and remote client easily but can network monitoring software determine what exactly is being sent between the two?
 
Security issues

The RDP protocol in its default configuration is vulnerable to a man-in-the-middle attack. Administrators can enable transport layer encryption to mitigate this risk.[17] [18]

RDP sessions are also susceptible to in-memory credential harvesting, which can be used to launch pass the hash attacks.
 
Essentially you'd need to MITM, provide the keys to both sides in order to eavesdrop. I don't know of anything out of the box that would do this (not saying it doesn't exist). 128bit RC4 as above - not fundamentally broken right now - if your transport layer is secure than you have nothing to worry about.

I always openSSH into the network I'm to connect with beforehand, this normally takes care of any MITM (provided the keys match I can be reasonably sure of the identity of my openSSH box, but of course if someone has rooted the openssh box they can nab the keys and DNS poison to MITM the openssh session), that still leaves me vulnerable to keyloggers and screen scrapers on the client end. It's "good enough for non-financial/non-HIPAA" installations - in those cases physical access is the only thing trusted.
 
Back
Top