Penetration Testing mailing list archives
RE: TS/3389 risk on Internet
From: "Keith T. Morgan" <keith.morgan () terradon com>
Date: Sat, 30 Oct 2004 16:38:25 -0400
People doing this always makes me itchy. I can't speak for the encryption of the authentication phase for TS, but we've run into situation with the administrator named "administrator" and free to brute-force without fear of lock-out. There are some free (though very slow) TS brute force tools out there. We've also run into situations where the user email addresses matched the account login, and the TS is almost always a domain member. Those accounts *could* be locked out (and some were, for proof of concept.) I don't know if it's possible to securely offer TS to the internet. It very well may be possible. But in almost every instance I've seen it done oh-so-very-wrong. Our nearly universal recommendation is to tunnel it over IPSEC.
-----Original Message----- From: net sec [mailto:netsec9 () hotmail com] Sent: Tuesday, October 26, 2004 5:19 PM To: pen-test () securityfocus com Subject: TS/3389 risk on Internet I have a peer that insists on allowing public access to his Domain controller via TS/tcp 3389 over the internet. I know there are some documented cases of 'man-in-the-middle' attacks for this service but I was hoping someone here could help me plead my case as to why this is a bad idea. Maybe you all disagree and regurlary allow this traffic. It just doesn't sit well with me. Does anyone know if the login/password is sent in clear text for TS authentication? Thanks in advance for any thoughts, Nicole _________________________________________________________________ On the road to retirement? Check out MSN Life Events for advice on how to get there! http://lifeevents.msn.com/category.aspx?cid=Retirement -------------------------------------------------------------- ---------------- Internet Security Systems. - Keeping You Ahead of the Threat When business losses are measured in seconds, Internet threats must be stopped before they impact your network. To learn how Internet Security Systems keeps organizations ahead of the threat with preemptive intrusion prevention, download the new whitepaper, Defining the Rules of Preemptive Protection, and end your reliance on reactive security technology. http://www.securityfocus.com/sponsor/ISS_pen-test_041001 -------------------------------------------------------------- -----------------
************************************************************************************************** The contents of this email and any attachments are confidential. It is intended for the named recipient(s) only. If you have received this email in error please notify the system manager or the sender immediately and do not disclose the contents to anyone or make copies. ** this message has been scanned for viruses, vandals and malicious content ** **************************************************************************************************
Current thread:
- Re: TS/3389 risk on Internet Lennart Sorth (Nov 01)
- <Possible follow-ups>
- Re: TS/3389 risk on Internet Adam Jones (Nov 01)
- Re: TS/3389 risk on Internet Jeffrey Clark (Nov 01)
- RE: TS/3389 risk on Internet Keith T. Morgan (Nov 01)
- RE: TS/3389 risk on Internet Peadro, Jeff (AIS) (Nov 01)
- Re: TS/3389 risk on Internet Tim (Nov 03)
- Re: TS/3389 risk on Internet Travis Potter (Nov 01)
- Re: TS/3389 risk on Internet Neale Green (Nov 03)
- Re: TS/3389 risk on Internet Davide Carnevali (Nov 01)
- RE: TS/3389 risk on Internet sk3tch (Nov 03)
- RE: TS/3389 risk on Internet Todd Towles (Nov 03)