WINDOWS 7 - RDP - DoS - BLUE SCREEN
- Layout for this exercise:
- Remote
Desktop Protocol (RDP) is a Microsoft protocol which provides a
graphical interface for connecting to a computer through a network
connection. RDP accepts connections at port TCP 3389
- Operating
systems like Windows 7 offer three options for RDP, regarding
security: Control
Panel -> System and Security -> System -> Remote settings ->
System Properties -> Remote:
- An
attacker can detect that the RDP 3389/tcp port is open at the
victim's computer:
- The less secure option allows any type of RDP connections, which is a vulnerability that can be taken advantage by exploiting it with the appropriate Metasploit module:
- Required
options for this module are simple, just the victim's IP and the RDP
port (3389):
- Running
this module some crafted packets are sent to the victim:
- As a
consequence a Denial Of Service attack results in a Blue Screen at
the target machine:
- To avoid this DoS attack, the RDP service should be disabled by default:
- Also,
the secure option with Network Level Authentication could be
considered: