Big Jump In Remote Desktop Attacks?! Watch How Hackers Do It And Protect Your Computers Now!

preview_player
Показать описание
// Membership //

// Courses //

// Books //

// Social Links //

// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Рекомендации по теме
Комментарии
Автор

What other trends of cyber attacks have been reported lately?

LoiLiangYang
Автор

Just to save your time: in this video, you can see how to brute-force a Windows RDP service using a script called crowbar and how to setup up security measures in Windows.

dmitriiprisacari
Автор

Just for people who are stuck finding the local security policy. THIS IS NOT AVAILABLE ON WINDOWS HOME (only pro, enterprise and a couple more)

jelle
Автор

Dear Loi, I really admire your work & you the way you present, makes it much more interesting. :)
I want to ask a very basic question here related to Hardware, what would be the minimum configuration needed to run these kind of Brute force attack.
I am testing Crowbar & using my own custom made word list in my Lab Environment.

ntcgtech
Автор

I really like your videos and everyday wait for your video.

mhi
Автор

I think you should explain how to scan systems for services like RDP in an ip range. Your video skips over important parts of obtaining the needed info to launch attacks against vulnerable systems. Brute force attacks do not work on systems that do not use dictionary words as passwords. Obviously 3rd party lists of commonly used or stolen passwords work in some cases but no competent admin is using dictionary words or commonly used passwords to secure their devices on a network.

HeathBilbrey
Автор

On the other hand by limiting the attempts of access to a certain number leads to denial access exploits if I am not mistaken.

dimitristsoutsouras
Автор

Amazing. Thank you for your great content! Seeing a lot of RDP pops in my SOC. From blue perspective, seeing this video is like being blind then suddenly being able to see. A lot of the time it's just like "Yeah, there is malicious activity, but who TF knows where it came from." Amazing to be able to see from the other side.

For the RDP session, any activity would be visible from the employee/victim's perspective, right? It wouldn't create a hidden session? So the attacker would have to log on at a time when the employee was not likely to be on the desktop?

askeladd
Автор

So does it mean the remote connection has to be enabled before this can be successful?

brightsarfo
Автор

Awesome video, great information! You have a fantastic channel keep up the great work. Thank you!

docholliday
Автор

I am new here, I am getting passion for Cyber Security, and also becoming and ethical hacker. Am enjoy your videos. Do you have like a coaching session or class?

IbrahimGanaMalgwi
Автор

Thanks for showing this security policy, I wasn't aware of it!

JD-ubic
Автор

U come after a long time, good to see u man! most of them try to attack only but I believe in securing and u too also!

hemanacademyandsecurity
Автор

Hi ... this was based on windows PC ... can you do a video or provide more information on Linux ... specifically POP's OS

lesmartin
Автор

Using those policies will automatically block your Server, as bot-nets are attacking the RDP port constantly. So make an IP Scope in your Firewall will be the solution, instead of using a windows server policy.

enzoscandelt
Автор

Example is with NLA disabled but crowbar says it supports NLA. If you're curious.

bfrdk
Автор

Do you need to change any setting to execute this on a computer outside your local network ?

anonymousbritishcolumbia
Автор

Iappreciate your perfect knoledge your support. TANKS.

omarimrharn
Автор

Thank you... what level of knowledge is required to complete your ethical hacking course and does it lead to a recognized qualification at all?

waynesvan
Автор

when i try cd crowbar/ it says no such file or directory anyone can help me fix it

TopG-btlk