Team OS : Your Only Destination To Custom OS !!

Welcome to TeamOS Community, Register or Login to the Community to Download Torrents, Get Access to Shoutbox, Post Replies, Use Search Engine and many more features. Register Today!

Locked RDPGuard 7.0.3

Status
Not open for further replies.

primord

Member
Downloaded
62 GB
Uploaded
323.9 GB
Ratio
5.23
Seedbonus
1,659
Upload Count
0 (0)
Member for 6 years
awesome bit of kit - requested please & many thanks! new version has country-based geo-fencing & super effective
if anybody knows of anything comparable functionality/alternative progs please share infos
 

Cyler

šŸ¤“ Super Admin
āš”OS Master
Downloaded
510.5 GB
Uploaded
24.5 TB
Ratio
49.16
Seedbonus
27,587
Upload Count
1 (1)
Member for 6 years
I will try to avoid being too technical. For those who read either they will understand if they are interested/working in Network security or they won't and I really want to avoid explaining details as this will make the post several pages long. What I describe below is a personal experience while I was helping a friend that worked in a relatively big company to upgrade their security after having some "issues".

I would suggest to look and dig deeper into what you think secure is. RDPGuard and other such programs are based on parsing windows logs and extracting IP addresses, and so those programs absolutely DO NOT detect any TLS RDP connections, since Windows event logs don't include the IP of the TLS source or at least that was the case a year or so ago when I first saw that program. You can find on GitHub and elsewhere, vbs scripts that do exactly that for free. Just google for the ts_block.vbs or Blocking brute force Terminal Services login attempts. Also, not sure if they fixed the bug that the service, even tho it appeared it was running, after 2-3 weeks or xxx amount of connections, it would stop the logging and prevention and you had to manually restart the service.

If you absolutely must have such a program then use CyberArms Intrusion Detection software that is free and logs TLS. it uses its own private approve/deny list, unlike RDPGuard which floods the windows firewall entries, could track RDP running in a port other than 3389, and has whitelisting that worked.

You must understand and without scaring you, that those measures will NOT stop exploits and poorly patched PCs/Servers and companies that don't have good practices (allowing admin account through rdp for example or open RDP to the internet is a big no-no). When the CIA hacking toolkit got "released", they made programs such as the above absolutely useless, They completely bypassed standard login methods due to exploits and login exploits =no brute forcing needed. Why brute force when you can just step around the door so to speak.

Please don't get me wrong, if and when you find this (or other) program, you can use it and it will do its job. It helps automate some tasks barebones as it is. Just don't ever think "Ok I'm secure now". My personal suggestion is to use L2TP VPN to connect in or allow RDP private gateway through HTTPS (again google is your friend). It basically covers RDP with an HTTPS portal. In any way, protection via the edge (firewalls) and good policies/practices will help you more, and researching on how to protect RDP sessions is a must.

Hope it helped.
 
Last edited:

Charles

āœ… Verified Member
Member
Downloaded
5 TB
Uploaded
268.5 TB
Ratio
53.8
Seedbonus
2,400,282
Upload Count
0 (0)
Member for 10 years
I will try to avoid being too technical. For those who read either they will understand if they are interested/working in Network security or they won't and I really want to avoid explaining details as this will make the post several pages long. What I describe below is a personal experience while I was helping a friend that worked in a relatively big company to upgrade their security after having some "issues".

I would suggest to look and dig deeper into what you think secure is. RDPGuard and other such programs are based on parsing windows logs and extracting IP addresses, and so those programs absolutely DO NOT detect any TLS RDP connections, since Windows event logs don't include the IP of the TLS source or at least that was the case a year or so ago when I first saw that program. You can find on GitHub and elsewhere, vbs scripts that do exactly that for free. Just google for the ts_block.vbs or Blocking brute force Terminal Services login attempts. Also, not sure if they fixed the bug that the service, even tho it appeared it was running, after 2-3 weeks or xxx amount of connections, it would stop the logging and prevention and you had to manually restart the service.

If you absolutely must have such a program then use the free CyberArms Intrusion Detection software that is free and logs TLS. it uses its own private approve/deny list, unlike RDPGuard which floods the windows firewall entries, could track RDP running in a port other than 3389, and has whitelisting that worked.

You must understand and without scaring you, that those measures will NOT stop exploits and poorly patched PCs/Servers and companies that don't have good practices (allowing admin account through rdp for example or open RDP to the internet is a big no-no). When the CIA hacking toolkit got "released", they made programs such as the above absolutely useless, They completely bypassed standard login methods due to exploits and login exploits =no brute forcing needed. Why brute force when you can just step around the door so to speak.

Please don't get me wrong, if and when you find this (or other) program, you can use it and it will do its job. It helps automate some tasks barebones as it is. Just don't ever think "Ok I'm secure now". My personal suggestion is to use L2TP VPN to connect in or allow RDP private gateway through HTTPS (again google is your friend). It basically covers RDP with an HTTPS portal. In any way, protection via the edge (firewalls) and good policies/practices will help you more, and researching on how to protect RDP sessions is a must.

Hope it helped.
CyberArms is a solid recommendation.
I simply blocked RDP on the router, at the default port, and disabled it in all machines via group policy and / or registry. On the machine I needed to RDP into, I changed the default port, and allowed it, to the machine, on the DMZ of the router. Your mileage may vary, but the easiest way to "block" something, is to disable / remove it via Group Policy or Regedit, depending on your system, in my humble opinion. You can always use a different remote access solution, like TeamViewer, AnyDesk, Splashtop, etc to get in, with RDP completely disabled.
 

primord

Member
Downloaded
62 GB
Uploaded
323.9 GB
Ratio
5.23
Seedbonus
1,659
Upload Count
0 (0)
Member for 6 years
Ayyeee!!! Awesome replies & infos thanks VERY MUCH!
Being a hobby lock-picker I don't even believe in security anymore,, and am getting older and the depth of sophistication never ends with the bits!
 

vdogeek

šŸ¤“ Super Admin
Uploader
Downloaded
93.5 GB
Uploaded
56.4 TB
Ratio
618.34
Seedbonus
8,541,092
Upload Count
1199 (1205)
Member for 9 years
1 month since last reply, considered completed and closed.
 
Status
Not open for further replies.
Top