4.9 - Remote Access Flashcards
1
Q
Remote desktop connections
A
- Share a desktop from a remote location
– It’s like you’re right there - RDP (Microsoft Remote Desktop Protocol)
– Clients for Mac OS, Linux, and others as well - VNC (Virtual Network Computing)
– Remote Frame Buffer (RFB) protocol
– Clients for many operating systems
– Many are open source - Commonly used for technical support
– And for scammers
2
Q
Remote desktop security
A
- Microsoft Remote Desktop
– An open port of tcp/3389 is a big tell
– Brute force attack is common - Third-party remote desktops
– Often secured with just a username and password
– There’s a LOT of username/password re-use - Once you’re in, you’re in
– The desktop is all yours
– Easy to jump to other systems
– Obtain personal information, bank details
– Make purchases from the user’s browser
3
Q
VPNs
A
- Virtual Private Networks
– Encrypted (private) data traversing a public network - Concentrator
– Encryption/decryption access device
– Often integrated into a firewall - Many deployment options
– Specialized cryptographic hardware
– Software-based options available - Used with client software
– Sometimes built into the OS
4
Q
Client-to-site VPN
A
- On-demand access from a remote device
– Software connects to a VPN concentrator - Some software can be configured as always-on
5
Q
VPN security
A
- VPN data on the network is very secure
– The best encryption technologies - Authentication is critical
– An attacker with the right credentials can gain access - Almost always includes
multi-factor authentication (MFA)
– Require more than just a username and password
6
Q
SSH (Secure Shell)
A
- Encrypted console communication - tcp/22
- Looks and acts the same as Telnet - tcp/23
7
Q
SSH security
A
- The network traffic is encrypted
– Nothing to see in the packets - Authentication is a concern
– SSH supports public/private key pair authentication - Certain accounts should be disabled in SSH
– For example, root
– Consider removing all
password-based authentication - Limit access to SSH by IP address
– Configure a local firewall or network filter
8
Q
RMM
A
- Managed Service Providers (MSP)
– Many customers and systems to monitor
– Many different service levels - Remote Monitoring and Management (RMM)
– Manage a system from a remote location - Many features
– Patch operating systems
– Remote login
– Anomaly monitoring
– Hardware/software inventory
9
Q
RMM security
A
- A popular attack point
- The RMM has a great deal of information and control
- Access should be limited
– Don’t allow everyone to connect to
the RMM service - Auditing is important
– Know who’s connecting to which devices and
what they’re doing
10
Q
Microsoft Remote Assistance (MSRA)
A
- Get access to a remote user’s desktop
– No firewall configurations or port forwarding required - User makes a request
– Sends an invitation with the details - Technician connects
– Uses the password in the request - Replaced by Quick Assist in Windows 10 and Windows 11
– The latest version of MSRA
11
Q
MSRA/Quick Assist security
A
- No ongoing Remote Desktop service required
– Avoids unintended access
– No port forwarding - Email with invitation details is always a concern
– Consider using voice communication - Perhaps a bit too easy to use
– Social engineering can be an issue
12
Q
Third-party tools
A
- Screen-sharing
– See and control a remote device
– GoToMyPC, TeamViewer - Video-conferencing
– Multi-user meetings with video and audio
– Zoom, WebEx - File transfer
– Store and share documents in the cloud
– Dropbox, Box.com, Google Drive - Desktop management
– Manage end-user devices and operating systems
– Citrix Endpoint Management, ManageEngine
Desktop Central