1 of 7

SEC 250

Remote Access

2 of 7

ACCESSING HOSTS & DATA

The most common method you’ve used in your tech experience has been accessing hosts & data locally

What does that look like?

  • username & password credentials which are created, managed & stored locally within the same OS
    • Fun Fact: Every OS has this

You on keyboard using credentials in same OS

3 of 7

ACCESSING STUFF … REMOTELY?

As you progress in more complex environments, another common method is accessing hosts & data remotely

Or in other words: accessing logon credentials which are created, managed & stored on another host’s OS, different than the one you physically are on now.

You on keyboard here

Credentials in this OS

4 of 7

REMOTE ACCESS

We will explore two common protocols which allow remote access:

  • SSH
  • RDP

5 of 7

SSH: SECURE SHELL

Protocol using asymmetric encryption (hence the “secure”) for authentication & communication

Default port: TCP 22

Used mostly for terminal command line interfaces (CLIs)

THE “go to” for secure channels in Linux

Remind me: How does this type of crypto work?

6 of 7

RDP: REMOTE DESKTOP PROTOCOL

Protocol (proprietary by Microsoft) using symmetric streaming encryption (RC4)

Default ports: TCP & UDP 3389

Wrapped into more software (Remote Desktop Connection, Terminal Services, or whatever Microsoft rebrands it)

Aim: to provide entire Desktop experience, remotely

Remind me: How does this type of crypto work?

7 of 7

C-I-A SPOT CHECK

How does remote access deal with C-I-A?

They are extremely helpful, and it’s great these protocols provide “secure” communications …

However, they also provide:

  • Defaults ports which are highly valued targets
  • Opportunities for bad configurations & bad access control
  • Vulnerabilities
  • Increased risk … reflect a moment, they allow remote access into other OSs by design #WhatCouldGoWrong?!