Главная
Study mode:
on
1
Introduction
2
About RDP
3
RDP Layers
4
RDP Security
5
Risk of RDP
6
Risks of RDP
7
Protocol Downgrade
8
Graphical Login
9
Why Microsoft did Graphical Login
10
Security advantages
11
Attack surface reduction
12
Authentication
13
Downgrade
14
Prevention
15
Group Policies
16
How to Attack
17
How to Mitigate
18
The Third Attack
19
The Villain
20
Responder
21
Report to Microsoft
22
What does this mean
23
What can we do
24
The future
25
Red team takeaways
26
Blue team takeaways
27
Devolution
28
Thank you
Description:
Explore the risks and mitigation strategies associated with Remote Desktop Protocol (RDP) in this informative conference talk from NorthSec 2022. Delve into the growing importance of RDP in remote work environments and its security implications when improperly deployed. Learn about conventional RDP attacks, including Monster-in-the-Middle (MITM) and NetNTLMv2 hash capture, as well as techniques to bypass Network Level Authentication (NLA). Discover the default vulnerability allowing server-side NLA downgrades in all clients. Gain insights from both attacker and defender perspectives, with step-by-step instructions for deploying a secure and functional RDP server. Benefit from the expertise of cybersecurity researchers Olivier Bilodeau and Lisandro Ubiedo as they share their findings from three years of work on PyRDP, an open-source RDP library.

The Risks of RDP and How to Mitigate Them

NorthSec
Add to list