Share a desktop from a remote location – It’s like you’re right there
RDP (Microsoft Remote Desktop Protocol) – Clients for Mac OS, Linux, and others as well
VNC (Virtual Network Computing) – Remote Frame Buffer (RFB) protocol – Clients for many operating systems – Many are open source
Commonly used for technical support – And for scammers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Remote desktop security
A
Microsoft Remote Desktop – An open port of tcp/3389 is a big tell – Brute force attack is common
Third-party remote desktops – Often secured with just a username and password – There’s a LOT of username/password re-use
Once you’re in, you’re in – The desktop is all yours – Easy to jump to other systems – Obtain personal information, bank details – Make purchases from the user’s browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
VPNs
A
Virtual Private Networks – Encrypted (private) data traversing a public network
Concentrator – Encryption/decryption access device – Often integrated into a firewall
Many deployment options – Specialized cryptographic hardware – Software-based options available
Used with client software – Sometimes built into the OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Client-to-site VPN
A
On-demand access from a remote device – Software connects to a VPN concentrator
Some software can be configured as always-on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
VPN security
A
VPN data on the network is very secure – The best encryption technologies
Authentication is critical – An attacker with the right credentials can gain access
Almost always includes multi-factor authentication (MFA) – Require more than just a username and password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
SSH (Secure Shell)
A
Encrypted console communication - tcp/22
Looks and acts the same as Telnet - tcp/23
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
SSH security
A
The network traffic is encrypted – Nothing to see in the packets
Authentication is a concern – SSH supports public/private key pair authentication
Certain accounts should be disabled in SSH – For example, root – Consider removing all password-based authentication
Limit access to SSH by IP address – Configure a local firewall or network filter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
RMM
A
Managed Service Providers (MSP) – Many customers and systems to monitor – Many different service levels
Remote Monitoring and Management (RMM) – Manage a system from a remote location
Many features – Patch operating systems – Remote login – Anomaly monitoring – Hardware/software inventory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
RMM security
A
A popular attack point
The RMM has a great deal of information and control
Access should be limited – Don’t allow everyone to connect to the RMM service
Auditing is important – Know who’s connecting to which devices and what they’re doing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Microsoft Remote Assistance (MSRA)
A
Get access to a remote user’s desktop – No firewall configurations or port forwarding required
User makes a request – Sends an invitation with the details
Technician connects – Uses the password in the request
Replaced by Quick Assist in Windows 10 and Windows 11 – The latest version of MSRA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
MSRA/Quick Assist security
A
No ongoing Remote Desktop service required – Avoids unintended access – No port forwarding
Email with invitation details is always a concern – Consider using voice communication
Perhaps a bit too easy to use – Social engineering can be an issue
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Third-party tools
A
Screen-sharing – See and control a remote device – GoToMyPC, TeamViewer
Video-conferencing – Multi-user meetings with video and audio – Zoom, WebEx
File transfer – Store and share documents in the cloud – Dropbox, Box.com, Google Drive
Desktop management – Manage end-user devices and operating systems – Citrix Endpoint Management, ManageEngine Desktop Central