ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Who is at Fault?

    IT Discussion
    6
    17
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      flaxking
      last edited by

      Scenario:
      User runs as local admin (why is outside of the scope of this scenario)
      Tech port forwards to user's workstation to expose RDP
      Aside from creating a strong password for user, tech does nothing else to secure RDP access

      Software support for a specific program is allowed in by user and creates a new admin account with a weak password for the user to test

      Password is guessed/brute forced from the web and computer is compromised.

      1 Reply Last reply Reply Quote 1
      • JaredBuschJ
        JaredBusch
        last edited by

        both parties are guilty of blatant stupidity.

        1 Reply Last reply Reply Quote 6
        • JaredBuschJ
          JaredBusch
          last edited by JaredBusch

          As well as whoever allowed an admin account to be a daily driver. That is totally relevant, even if you try to claim it isn't.

          F 1 Reply Last reply Reply Quote 4
          • F
            flaxking @JaredBusch
            last edited by

            @jaredbusch said in Who is at Fault?:

            As well as whoever allowed an admin account to be a daily driver. That is totally relevant, even if you try to claim it isn't.

            It is relevant, however it complicates the scenario at lot more and is beyond the people currently in the scenario.

            JaredBuschJ 1 Reply Last reply Reply Quote 0
            • JaredBuschJ
              JaredBusch @flaxking
              last edited by

              @flaxking said in Who is at Fault?:

              @jaredbusch said in Who is at Fault?:

              As well as whoever allowed an admin account to be a daily driver. That is totally relevant, even if you try to claim it isn't.

              It is relevant, however it complicates the scenario at lot more and is beyond the people currently in the scenario.

              But one or both actions could have been impossible had that not been setup in the first place.

              F 1 Reply Last reply Reply Quote 0
              • F
                flaxking @JaredBusch
                last edited by

                @jaredbusch said in Who is at Fault?:

                @flaxking said in Who is at Fault?:

                @jaredbusch said in Who is at Fault?:

                As well as whoever allowed an admin account to be a daily driver. That is totally relevant, even if you try to claim it isn't.

                It is relevant, however it complicates the scenario at lot more and is beyond the people currently in the scenario.

                But one or both actions could have been impossible had that not been setup in the first place.

                But it is a predefined constraint that the tech, user, and software support tech all have to work with.

                1 Reply Last reply Reply Quote 0
                • thwrT
                  thwr
                  last edited by

                  Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                  Net RunnerN 1 Reply Last reply Reply Quote 2
                  • Net RunnerN
                    Net Runner @thwr
                    last edited by

                    @thwr said in Who is at Fault?:

                    Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                    This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                    scottalanmillerS 1 Reply Last reply Reply Quote 2
                    • scottalanmillerS
                      scottalanmiller @Net Runner
                      last edited by

                      @net-runner said in Who is at Fault?:

                      @thwr said in Who is at Fault?:

                      Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                      This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                      Same thing happens to exposed VPNs 🙂

                      thwrT 1 Reply Last reply Reply Quote 1
                      • thwrT
                        thwr @scottalanmiller
                        last edited by thwr

                        @scottalanmiller said in Who is at Fault?:

                        @net-runner said in Who is at Fault?:

                        @thwr said in Who is at Fault?:

                        Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                        This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                        Same thing happens to exposed VPNs 🙂

                        I won't compare a certificate based VPN with RDP 😉

                        JaredBuschJ 1 Reply Last reply Reply Quote 0
                        • JaredBuschJ
                          JaredBusch @thwr
                          last edited by

                          @thwr said in Who is at Fault?:

                          @scottalanmiller said in Who is at Fault?:

                          @net-runner said in Who is at Fault?:

                          @thwr said in Who is at Fault?:

                          Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                          This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                          Same thing happens to exposed VPNs 🙂

                          @scottalanmiller said in Who is at Fault?:

                          @net-runner said in Who is at Fault?:

                          @thwr said in Who is at Fault?:

                          Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                          This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                          Same thing happens to exposed VPNs 🙂

                          I won't compare a certificate based VPN with RDP 😉

                          Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                          thwrT 1 Reply Last reply Reply Quote 0
                          • thwrT
                            thwr @JaredBusch
                            last edited by

                            @jaredbusch said in Who is at Fault?:

                            @thwr said in Who is at Fault?:

                            @scottalanmiller said in Who is at Fault?:

                            @net-runner said in Who is at Fault?:

                            @thwr said in Who is at Fault?:

                            Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                            This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                            Same thing happens to exposed VPNs 🙂

                            @scottalanmiller said in Who is at Fault?:

                            @net-runner said in Who is at Fault?:

                            @thwr said in Who is at Fault?:

                            Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                            This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                            Same thing happens to exposed VPNs 🙂

                            I won't compare a certificate based VPN with RDP 😉

                            Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                            That's the point. It's a whole different story

                            DashrenderD 1 Reply Last reply Reply Quote 0
                            • DashrenderD
                              Dashrender @thwr
                              last edited by

                              @thwr said in Who is at Fault?:

                              @jaredbusch said in Who is at Fault?:

                              @thwr said in Who is at Fault?:

                              @scottalanmiller said in Who is at Fault?:

                              @net-runner said in Who is at Fault?:

                              @thwr said in Who is at Fault?:

                              Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                              This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                              Same thing happens to exposed VPNs 🙂

                              @scottalanmiller said in Who is at Fault?:

                              @net-runner said in Who is at Fault?:

                              @thwr said in Who is at Fault?:

                              Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                              This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                              Same thing happens to exposed VPNs 🙂

                              I won't compare a certificate based VPN with RDP 😉

                              Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                              That's the point. It's a whole different story

                              Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                              I'm not sure you can do RDP auth based on certificate?

                              thwrT 1 Reply Last reply Reply Quote 0
                              • thwrT
                                thwr @Dashrender
                                last edited by

                                @dashrender said in Who is at Fault?:

                                @thwr said in Who is at Fault?:

                                @jaredbusch said in Who is at Fault?:

                                @thwr said in Who is at Fault?:

                                @scottalanmiller said in Who is at Fault?:

                                @net-runner said in Who is at Fault?:

                                @thwr said in Who is at Fault?:

                                Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                                This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                                Same thing happens to exposed VPNs 🙂

                                @scottalanmiller said in Who is at Fault?:

                                @net-runner said in Who is at Fault?:

                                @thwr said in Who is at Fault?:

                                Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                                This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                                Same thing happens to exposed VPNs 🙂

                                I won't compare a certificate based VPN with RDP 😉

                                Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                                That's the point. It's a whole different story

                                Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                                I'm not sure you can do RDP auth based on certificate?

                                I wouldn't even start this kind of discussion. Do you really think that someone who puts RDP into the wild and got hacked (probably by brute force and weak passwords) really cares about client certificates? I doubt that.

                                DashrenderD 1 Reply Last reply Reply Quote 0
                                • DashrenderD
                                  Dashrender @thwr
                                  last edited by

                                  @thwr said in Who is at Fault?:

                                  @dashrender said in Who is at Fault?:

                                  @thwr said in Who is at Fault?:

                                  @jaredbusch said in Who is at Fault?:

                                  @thwr said in Who is at Fault?:

                                  @scottalanmiller said in Who is at Fault?:

                                  @net-runner said in Who is at Fault?:

                                  @thwr said in Who is at Fault?:

                                  Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                                  This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                                  Same thing happens to exposed VPNs 🙂

                                  @scottalanmiller said in Who is at Fault?:

                                  @net-runner said in Who is at Fault?:

                                  @thwr said in Who is at Fault?:

                                  Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                                  This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                                  Same thing happens to exposed VPNs 🙂

                                  I won't compare a certificate based VPN with RDP 😉

                                  Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                                  That's the point. It's a whole different story

                                  Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                                  I'm not sure you can do RDP auth based on certificate?

                                  I wouldn't even start this kind of discussion. Do you really think that someone who puts RDP into the wild and got hacked (probably by brute force and weak passwords) really cares about client certificates? I doubt that.

                                  MS publishes RDP directly on the internet - this is my point. So taking certs out of the conversation - are you saying MS is crazy?

                                  thwrT 1 Reply Last reply Reply Quote 0
                                  • thwrT
                                    thwr @Dashrender
                                    last edited by

                                    @dashrender said in Who is at Fault?:

                                    @thwr said in Who is at Fault?:

                                    @dashrender said in Who is at Fault?:

                                    @thwr said in Who is at Fault?:

                                    @jaredbusch said in Who is at Fault?:

                                    @thwr said in Who is at Fault?:

                                    @scottalanmiller said in Who is at Fault?:

                                    @net-runner said in Who is at Fault?:

                                    @thwr said in Who is at Fault?:

                                    Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                                    This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                                    Same thing happens to exposed VPNs 🙂

                                    @scottalanmiller said in Who is at Fault?:

                                    @net-runner said in Who is at Fault?:

                                    @thwr said in Who is at Fault?:

                                    Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                                    This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                                    Same thing happens to exposed VPNs 🙂

                                    I won't compare a certificate based VPN with RDP 😉

                                    Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                                    That's the point. It's a whole different story

                                    Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                                    I'm not sure you can do RDP auth based on certificate?

                                    I wouldn't even start this kind of discussion. Do you really think that someone who puts RDP into the wild and got hacked (probably by brute force and weak passwords) really cares about client certificates? I doubt that.

                                    MS publishes RDP directly on the internet - this is my point. So taking certs out of the conversation - are you saying MS is crazy?

                                    I'm talking about this specific scenario here, not RDP in general.

                                    1 Reply Last reply Reply Quote 0
                                    • DashrenderD
                                      Dashrender
                                      last edited by

                                      This scenerio is the fault of:

                                      • IT for giving the user local admin,
                                      • the local user for allowing a remote person to create a local account
                                      • the local user for not checking the password requirements for that account
                                      • the remote support for using a shit password
                                      • the remote support for allowing use to have access to RDP (assuming it wasn't needed)
                                      1 Reply Last reply Reply Quote 0
                                      • 1 / 1
                                      • First post
                                        Last post