Тёмный

Enabling Remote Desktop Services in Windows Server 2016 DC (CredSSP Encryption Oracle Remediation) 

Exploit & Operate
Подписаться 1,4 тыс.
Просмотров 375
50% 1

What is Remote Desktop Connection?
Simply put, Remote Desktop Connection is a feature that connects two computers together. The operator can control the operation of the remote computer as if they were sitting directly in front of the computer screen. On Windows Server, this is a useful control feature that you cannot ignore. Although all versions of Windows include Remote Desktop Connection, you need to activate it first before you can use it.
To use Remote Desktop Connection with the best quality, you need a Remote Desktop Services 2019 license key. With the support of this product, you can operate the computer control extremely efficiently.
What does Remote Desktop Connection do for you?
Remote Desktop Connection has the ability to "beat" the barrier that geographical distance brings. This means that as long as there is an Internet connection, users will be able to connect to the server's working environment from a very remote location. Then, users can perform administrative tasks, manage the operating system, and even maintain the computer system without having to go to the actual location of the computer.
In March 2018, Microsoft released a security update regarding the Credential Security Support Provider protocol (CredSSP) used by the Remote Desktop Protocol (RDP) connection between the Windows Client and Windows Server.
Invisibly this affects the Windows Remote Desktop application. When you open the Remote Desktop client application to connect to a Windows Server or VPS you may encounter an error message about “CredSSP encryption oracle remediation error” as shown in the video when trying to connect Remote Desktop to Windows Server
Before, when this update was not available, it was easy for you to connect to a Windows server using RDP, but after Microsoft forced Windows Server to update a new patch, it was not easy for the client to connect to RDP Windows Server anymore. This situation occurs when an RDP connection is created between a party that has been patched (usually the RDP Client) and a party that has not been patched (usually Windows Server).
Reason
This is due to security vulnerability CVE-2018-0886 | CredSSP Remote Code Execution Vulnerability. In March 2018 Microsoft released an update to address two issues:
Changed the way the CredSSP protocol authenticates requests during authentication.
Change the “Encryption Oracle Remediation” policy configuration from Vulnerable to Mitigated .
RDP authentication problems can arise when the local client and the remote Windows Server server differ in the “Encryption Oracle Remediation” configuration parameter that defines how to build an RDP session with CredSSP.
So there will be 3 cases as follows:
If the client side has automatically updated the patch, and makes an RDP connection to the Windows Server that has not been patched, the connection will be locked and the error will be displayed as above.
If the client side has not been patched, while Windows Server has updated the patch, RDP will still work. It's just that the session is vulnerable.
If both the client side and windows server have updated the patch, then the RDP connection is completely secure with the new standard.
Subcribe Us : ru-vid.com...
Contact :
+Telegram group: t.me/CCNP300_410
+ Facebook: 100010133917307
+ RU-vid: / @exploitoperate

Наука

Опубликовано:

 

4 авг 2023

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 8   
@khanh7618
@khanh7618 10 месяцев назад
Thanks. This method works. Often found the first method but they didn't know, sometime different server has got no Encryption Oracle Remediation on GPO.
@matteobianchi12345
@matteobianchi12345 10 месяцев назад
thanks for the tips, they where very usefull
@EileenAnthony-hv2bj
@EileenAnthony-hv2bj 11 месяцев назад
Very interesting. I love it 😉
@DominicAquila
@DominicAquila 10 месяцев назад
very good, i like it!
@CLPAP
@CLPAP 10 месяцев назад
keep it up
@TechFusionVerse-xy4yb
@TechFusionVerse-xy4yb 10 месяцев назад
Useful
@shinshu188
@shinshu188 10 месяцев назад
nice
@user-mg3jj6nv5r
@user-mg3jj6nv5r 10 месяцев назад
:))
Далее
Qizim 58-qism | Anons |Nimaga meni bolam o'ladi ?
00:47
How to not get hacked: real example
13:55
Просмотров 391 тыс.
How NVIDIA just beat every other tech company
9:20
Просмотров 1,1 млн
Best operating system for Servers in 2024
11:41
Просмотров 34 тыс.
How to Soldering wire in Factory ?
0:10
Просмотров 1,2 млн