What is Remote Desktop Connection?
Simply put, Remote Desktop Connection is a feature that connects two computers together. The operator can control the operation of the remote computer as if they were sitting directly in front of the computer screen. On Windows Server, this is a useful control feature that you cannot ignore. Although all versions of Windows include Remote Desktop Connection, you need to activate it first before you can use it.
To use Remote Desktop Connection with the best quality, you need a Remote Desktop Services 2019 license key. With the support of this product, you can operate the computer control extremely efficiently.
What does Remote Desktop Connection do for you?
Remote Desktop Connection has the ability to "beat" the barrier that geographical distance brings. This means that as long as there is an Internet connection, users will be able to connect to the server's working environment from a very remote location. Then, users can perform administrative tasks, manage the operating system, and even maintain the computer system without having to go to the actual location of the computer.
In March 2018, Microsoft released a security update regarding the Credential Security Support Provider protocol (CredSSP) used by the Remote Desktop Protocol (RDP) connection between the Windows Client and Windows Server.
Invisibly this affects the Windows Remote Desktop application. When you open the Remote Desktop client application to connect to a Windows Server or VPS you may encounter an error message about “CredSSP encryption oracle remediation error” as shown in the video when trying to connect Remote Desktop to Windows Server
Before, when this update was not available, it was easy for you to connect to a Windows server using RDP, but after Microsoft forced Windows Server to update a new patch, it was not easy for the client to connect to RDP Windows Server anymore. This situation occurs when an RDP connection is created between a party that has been patched (usually the RDP Client) and a party that has not been patched (usually Windows Server).
Reason
This is due to security vulnerability CVE-2018-0886 | CredSSP Remote Code Execution Vulnerability. In March 2018 Microsoft released an update to address two issues:
Changed the way the CredSSP protocol authenticates requests during authentication.
Change the “Encryption Oracle Remediation” policy configuration from Vulnerable to Mitigated .
RDP authentication problems can arise when the local client and the remote Windows Server server differ in the “Encryption Oracle Remediation” configuration parameter that defines how to build an RDP session with CredSSP.
So there will be 3 cases as follows:
If the client side has automatically updated the patch, and makes an RDP connection to the Windows Server that has not been patched, the connection will be locked and the error will be displayed as above.
If the client side has not been patched, while Windows Server has updated the patch, RDP will still work. It's just that the session is vulnerable.
If both the client side and windows server have updated the patch, then the RDP connection is completely secure with the new standard.
Subcribe Us : ru-vid.com...
Contact :
+Telegram group: t.me/CCNP300_410
+ Facebook: 100010133917307
+ RU-vid: / @exploitoperate
4 авг 2023