Day 15 : Introduction to Remote Desktop Protocol (RDP)
One of the most abused protocols in cyber attacks is the Remote Desktop Protocol (RDP). According to this article, Sophos has found that RDP was abused in 90% of cyber attacks in 2023. In today's article I will go over what RDP is, it's features and functionalities, and how to protect yourself from RDP abuse.
What is Remote Desktop Protocol?
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft that allows users to remotely connect to and control another computer over a network. RDP is commonly used for remote management, technical support, and accessing resources on a computer from a different location. The protocol provides a graphical interface that enables users to interact with the remote machine as if they were sitting in front of it. RDP makes use of TCP and uses port 3389 by default.
Features of RDP:
Advantages of RDP
How is RDP Abused by Attackers?
Attackers regularly scan the internet for exposed RDP services running on servers to find targets to attack. They can then either try brute forcing their way in using common usernames and passwords, or use credentials they might have phished from users.
If access is gained, the attackers might then perform credential dumping to harvest even more valid credentials from the server, using the for lateral movement across the network.
Gaining such access can get attackers closer to their goal of data exfiltration or deploying ransomware.
How to Find Exposed RDP Servers
There are many ways to find exposed RDP Servers. Please note that one must not try to attack these machines since its unethical and illegal.
Recommended by LinkedIn
Shodan
Using shodan.io, on searching for port:3389, I got a list of machines running an exposed RDP service:
Censys
Another platform to find exposed RDP services is censys.io. Head over to the website and search for 3389
We can narrow down our search by filtering the options to the left.
How to Protect Yourself from RDP Abuse Attacks
Now that we have a good understanding of RDP, its associated ports and services, we can take the following steps to protect ourselves from attackers:
Conclusion
With invaluable guidance from Mr. Stevens at MYDFIR (his website) and his YT video outlining day 15 of the 30-Day SOC Challenge, I learned about Remote Desktop Protocol (RDP), its functionalities, how it is abused, how to find exposed RDP endpoints and how to defend myself from RDP abuse attacks.
ex-EY | Software Developer | Machine Learning | ex-SaaS Labs | BVCOE'24
7moCfbr. Keep it up!
🏳️🌈Trusted IT Solutions Consultant | AI, Blockchain, Web & Mobile Apps | Author, Tech Topics | Goal: Give, Teach & Share | Featured Analyst on Fast Company | TechBullion | CIO Grid | Small Biz Digest | GoDaddy
8moBest of luck