Exploiting vulnerabilities in communication protocols
Some protocols transmit access credentials in the clear (Telnet, HTTP, and FTP). Using a packet sniffer such as Wireshark will allow an attacker to intercept and reuse the credentials.
However, most remote access protocols, especially those embedded in the operating system, are now protected with access controls and encryption. Although this adds a degree of security, they are still subject to attacks that may occur due to misconfigurations or the use of poor encryption keys. In this section, we will examine other risks that can be exploited to compromise supposedly secure communication channels.
Compromising Remote Desktop Protocol (RDP)
RDP is a proprietary Microsoft communication protocol, which allows a client to connect with another computer using a graphical interface. Although the protocol is encrypted, access to the server can be gained if the attacker guesses the username and password.
Note
It should be noted that the most common...