Brute Force Hacking In Terminal Server Environments
Friday, 21 July 2006 by Michel Roth
I've written an article about Brute Force Hacking in Terminal Server environments at MSTerminalServices.org. In this article I will discuss how hackers use tools to perform brute force password hacking in Terminal Server environments.

One of the most common techniques used by hackers to penetrate your network, is just plain-old password guessing. This goes for external hacking attempts as well as internal hacking attempts. In this article I will discuss how hackers can use tools to perform brute force password hacking in your Terminal Server environments and what you can to prevent these kinds of attacks.

Guessing passwords is one of the oldest, yet one of the most effective techniques to gain access to a system. The reason that it is one of the most effective hacking techniques is because there’s a weak link in the whole process: humans. This is because humans like “samantha1” better for a password than “Tr15%^<!+”. Although the latter would be far more difficult to hack than the first password, there’s a good chance that no user would ever get the latter password memorized.

This is what hackers take advantage of. The only thing a hacker needs is a logon “vehicle”. This could be a command prompt, a web page or… the Microsoft Remote Desktop Connection conveniently included in every recent version of Windows or readily available from Microsoft’s download site.

Read the entire article here.

Related Items:

Hacking Terminal Server Screencast (14 December 2007)
Brute Force Hacking In Terminal Server Environments (20 July 2006)
Fileserving In Terminal Server Environments (3 May 2006)
Kevin Mitnick Authors Appsense Whitepaper (12 July 2006)
VMware ESX Server Multiple Vulnerabilities (2 August 2006)
VMX-Builder (31 October 2005)
Comments (0)