Adrian Vollmer - Attacking RDP with Seth

wdPkY7gykf4/default.jpg

When it comes to the security of RDP hosts, experience shows that many organizations rarely replace the default self-signed certificates with certificates signed by their corporate CA. This obviously leaves them vulnerable to Man-in-the-Middle attacks. However, until now no open source proof-of-concept exploit is available to the IT security community, despite the specifications of RDP being freely available.

Since many administrators often perform tasks on critical servers such as the domain controller via RDP, usually with highly privileged accounts, RDP is a worthwhile target of potential adversaries. In this talk, we want to analyze the implementation of the relevant parts of RDP in detail and show how to develop a tool that can extract credentials in clear text if the user is careless enough to ignore SSL warnings. The intended audience is system administrators, penetration testers and security enthusiasts.

https://www.hacktivity.com

wdPkY7gykf4/default.jpg
Adrian Vollmer - Attacking RDP with Seth Adrian Vollmer - Attacking RDP with Seth Reviewed by Anonymous on June 18, 2019 Rating: 5