![]() ![]() ![]() Next create another rule that says any TCP connection attempts to 33, put them on a BAN_LIST. Only allow IPs on that list to access port 3389 (or even better, change that port). Set a firewall rule that when you try to connect to port 3350 (or whatever), then add the source IP to an RDP_OK list with a timeout of 60 seconds. But due to the disappointing track record, I would NOT trust RDP. Since then, I've left a test VM exposed to the internet and so far it hasn't been hacked. So without logging in, a hacker could add a user and promote it to an administrator. Microsoft dropped the ball 3 times already where a hacker could send a specially crafted packet that would contain a command that would be executed under the System user. First ensure you have the latest updates to Win 7 or Win 10. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |