<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Rdp windows in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325736#M83053</link>
    <description>&lt;P&gt;Let me understand your question,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Allow anyone from Internet able to connect to a system listen on Remote Desktop protocol on your network?&amp;nbsp; &amp;nbsp; Is that what you are asking?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; How update is the system patch level?&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; There could be a chance of non-publicly disclosure bugs on RDP can use a backdoor (also known as 0 days attack, which I disagree with that term).&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; How is the password complexity and length?&amp;nbsp; Does it require multi factor authentication?&amp;nbsp; &amp;nbsp;Is it a client cert based login authentication?&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; If I am able to login to that host,&amp;nbsp; is that system part of Corp Active Directory?&amp;nbsp; How secured is the AD admin accounts?&lt;/P&gt;&lt;P&gt;and more and more...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 01 May 2020 22:14:27 GMT</pubDate>
    <dc:creator>nextgenhappines</dc:creator>
    <dc:date>2020-05-01T22:14:27Z</dc:date>
    <item>
      <title>Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325728#M83052</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;is it a good idea giving access to public windowd&amp;nbsp; rdp ?.&lt;/P&gt;&lt;P&gt;Folks says do not publish outside&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any good reason for this ?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2020 21:17:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325728#M83052</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2020-05-01T21:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325736#M83053</link>
      <description>&lt;P&gt;Let me understand your question,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Allow anyone from Internet able to connect to a system listen on Remote Desktop protocol on your network?&amp;nbsp; &amp;nbsp; Is that what you are asking?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; How update is the system patch level?&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; There could be a chance of non-publicly disclosure bugs on RDP can use a backdoor (also known as 0 days attack, which I disagree with that term).&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; How is the password complexity and length?&amp;nbsp; Does it require multi factor authentication?&amp;nbsp; &amp;nbsp;Is it a client cert based login authentication?&lt;/P&gt;&lt;P&gt;4.&amp;nbsp; If I am able to login to that host,&amp;nbsp; is that system part of Corp Active Directory?&amp;nbsp; How secured is the AD admin accounts?&lt;/P&gt;&lt;P&gt;and more and more...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 May 2020 22:14:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325736#M83053</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2020-05-01T22:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325766#M83055</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Allow anyone from Internet able to connect to a system listen on Remote Desktop protocol on your network?&amp;nbsp; &amp;nbsp; Is that what you are asking?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;yes&amp;nbsp; and ofcourse we will give them credentials&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3 . How is the password complexity and length?&amp;nbsp; Does it require multi factor authentication?&amp;nbsp; &amp;nbsp;Is it a client cert based login authentication?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;No mfa&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;no cert based auth&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;4 .&amp;nbsp; If I am able to login to that host,&amp;nbsp; is that system part of Corp Active Directory?&amp;nbsp; How secured is the AD admin accounts?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What is the relations Ad admin accounts security&amp;nbsp; with that&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 01:19:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325766#M83055</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2020-05-02T01:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325777#M83057</link>
      <description>&lt;P&gt;Let's see, once I am able to RDP login to a host which is part of the AD.&amp;nbsp; The&amp;nbsp;opportunity is endless.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can start by following these steps which I just finish #2,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Reconnaissance&lt;/LI&gt;&lt;LI&gt;Initial intrusion into the network&lt;/LI&gt;&lt;LI&gt;Establish a backdoor into the network&lt;/LI&gt;&lt;LI&gt;Obtain user credentials&lt;/LI&gt;&lt;LI&gt;Install various utilities&lt;/LI&gt;&lt;LI&gt;Privilege escalation/ lateral movement/ data exfiltration&lt;/LI&gt;&lt;LI&gt;Maintain persistence&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Google "pass the hash" , "windows privilege escalation"&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or I just drop a ransomware on the file servers to lock all the user data , etc. etc...&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 03:08:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325777#M83057</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2020-05-02T03:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325780#M83058</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;In that case&amp;nbsp; what If I&amp;nbsp; go&amp;nbsp; for&amp;nbsp; &amp;nbsp;without joining domain (Work station )&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 04:12:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325780#M83058</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2020-05-02T04:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325791#M83061</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59972"&gt;@simsim&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Better approach will be allow Remote Access over custom port instead of 3389.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mayur&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 08:25:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325791#M83061</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-05-02T08:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325794#M83063</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to understand what are the pros and cons&amp;nbsp; .&lt;/P&gt;&lt;P&gt;If I give&amp;nbsp; &amp;nbsp;without joining&amp;nbsp; domain is there any benefit&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 08:53:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325794#M83063</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2020-05-02T08:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325798#M83064</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59972"&gt;@simsim&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The pro is easy to setup to allow remote access to your network using RDP..&lt;/P&gt;&lt;P&gt;The con is without sufficient protection and monitoring in place (ie MFA, patch system, log monitoring), once the hacker gains access via RDP.&amp;nbsp; The damage that can cause is unlimited.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;E&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 12:00:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325798#M83064</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2020-05-02T12:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325803#M83065</link>
      <description>&lt;P&gt;Agreed with &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/23897"&gt;@nextgenhappines&lt;/a&gt;&amp;nbsp;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;RDP over the internet&amp;nbsp; is most insecure way of providing access.&amp;nbsp;&lt;SPAN&gt;Attackers can also exploit vulnerable RDP services to perform remote code execution and seize control over targets.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Better approach would be allowing access over VPN. If not possible over VPN, give access over custom port instead of default port.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!&lt;/P&gt;&lt;P&gt;Mayur&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 13:11:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325803#M83065</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-05-02T13:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325820#M83069</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If&amp;nbsp; I&amp;nbsp; change the default port to a different what is the possibility&amp;nbsp; of&amp;nbsp; identifying&amp;nbsp; &amp;nbsp;rdp service on that port by an attacker&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 20:08:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325820#M83069</guid>
      <dc:creator>simsim</dc:creator>
      <dc:date>2020-05-02T20:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325831#M83074</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59972"&gt;@simsim&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you use custom port for RDP connection, then it decreases probability of hacking that port. As there're 65535 ports so it will be difficult for attacker to know the exact custom port. Technically porte will be less than 65535 as some of the ports are reserved still you get my point right..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV align="left"&gt;&lt;P&gt;My personal opinion would be not to open direct RDP access over the internet. But if&amp;nbsp; you don't have any other options like VPN and still you want to open it, then go for above option of custom port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mayur&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 03 May 2020 06:22:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325831#M83074</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-05-03T06:22:25Z</dc:date>
    </item>
    <item>
      <title>Re: Rdp windows</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325840#M83075</link>
      <description>&lt;P&gt;The whole "obscure RDP by changing the port" thing doesn't really work anymore, and hasn't for probably a decade. Will it take additional time for someone to scan your public-ip and actually discover the port, sure. Since you aren't using the default of 3389 (and hopefully nothing near that, as many scanners will include 3389+- 15 ports) then you won't get picked up by some scanning because they are only looking for the easy targets.&lt;/P&gt;&lt;P&gt;You will still eventually be scanned and picked up and known to be running RDP on a non-common port. It's not like a port scan is a difficult thing to do, and we have organizations that exists to scan the internet and publish all open ports. Once you open up RDP, even on non-default ports, you've opened up RDP to the outside world.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 May 2020 13:46:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/rdp-windows/m-p/325840#M83075</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-05-03T13:46:00Z</dc:date>
    </item>
  </channel>
</rss>

