4.9 - Remote Access Flashcards

1
Q

Remote desktop connections

A
  • Share a desktop from a remote location
    – It’s like you’re right there
  • RDP (Microsoft Remote Desktop Protocol)
    – Clients for Mac OS, Linux, and others as well
  • VNC (Virtual Network Computing)
    – Remote Frame Buffer (RFB) protocol
    – Clients for many operating systems
    – Many are open source
  • Commonly used for technical support
    – And for scammers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Remote desktop security

A
  • Microsoft Remote Desktop
    – An open port of tcp/3389 is a big tell
    – Brute force attack is common
  • Third-party remote desktops
    – Often secured with just a username and password
    – There’s a LOT of username/password re-use
  • Once you’re in, you’re in
    – The desktop is all yours
    – Easy to jump to other systems
    – Obtain personal information, bank details
    – Make purchases from the user’s browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VPNs

A
  • Virtual Private Networks
    – Encrypted (private) data traversing a public network
  • Concentrator
    – Encryption/decryption access device
    – Often integrated into a firewall
  • Many deployment options
    – Specialized cryptographic hardware
    – Software-based options available
  • Used with client software
    – Sometimes built into the OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Client-to-site VPN

A
  • On-demand access from a remote device
    – Software connects to a VPN concentrator
  • Some software can be configured as always-on
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VPN security

A
  • VPN data on the network is very secure
    – The best encryption technologies
  • Authentication is critical
    – An attacker with the right credentials can gain access
  • Almost always includes
    multi-factor authentication (MFA)
    – Require more than just a username and password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SSH (Secure Shell)

A
  • Encrypted console communication - tcp/22
  • Looks and acts the same as Telnet - tcp/23
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SSH security

A
  • The network traffic is encrypted
    – Nothing to see in the packets
  • Authentication is a concern
    – SSH supports public/private key pair authentication
  • Certain accounts should be disabled in SSH
    – For example, root
    – Consider removing all
    password-based authentication
  • Limit access to SSH by IP address
    – Configure a local firewall or network filter
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RMM

A
  • Managed Service Providers (MSP)
    – Many customers and systems to monitor
    – Many different service levels
  • Remote Monitoring and Management (RMM)
    – Manage a system from a remote location
  • Many features
    – Patch operating systems
    – Remote login
    – Anomaly monitoring
    – Hardware/software inventory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RMM security

A
  • A popular attack point
  • The RMM has a great deal of information and control
  • Access should be limited
    – Don’t allow everyone to connect to
    the RMM service
  • Auditing is important
    – Know who’s connecting to which devices and
    what they’re doing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Microsoft Remote Assistance (MSRA)

A
  • Get access to a remote user’s desktop
    – No firewall configurations or port forwarding required
  • User makes a request
    – Sends an invitation with the details
  • Technician connects
    – Uses the password in the request
  • Replaced by Quick Assist in Windows 10 and Windows 11
    – The latest version of MSRA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MSRA/Quick Assist security

A
  • No ongoing Remote Desktop service required
    – Avoids unintended access
    – No port forwarding
  • Email with invitation details is always a concern
    – Consider using voice communication
  • Perhaps a bit too easy to use
    – Social engineering can be an issue
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Third-party tools

A
  • Screen-sharing
    – See and control a remote device
    – GoToMyPC, TeamViewer
  • Video-conferencing
    – Multi-user meetings with video and audio
    – Zoom, WebEx
  • File transfer
    – Store and share documents in the cloud
    – Dropbox, Box.com, Google Drive
  • Desktop management
    – Manage end-user devices and operating systems
    – Citrix Endpoint Management, ManageEngine
    Desktop Central
How well did you know this?
1
Not at all
2
3
4
5
Perfectly