Atom Feed - Avian Waves Forums - Topic:Reverse RDP Attack: Code Execution on RDP Clients - 20Avian Waves Forums - Atom Feedurn:https:--www-avianwaves-com-Forums-aspx:AtomFeed:AvianWavesForums:Topic:ReverseRDPAttack:CodeExecutiononRDPClients-20:1Copyright 2024 Avian Waves Forums2024-03-28T08:27:05Zhttps://www.avianwaves.com/Forums.aspx/DesktopModules/YetAnotherForumDotNet/Images/Logos/favicon.pngForum Adminhttps://www.avianwaves.com/Forums.aspxno-reply@avianwaves.comTimothyhttps://www.avianwaves.com/Forums/g/Profile/u/2/TimothyTimothyhttps://www.avianwaves.com/Forums/g/Profile/u/2/TimothyTextbook1987https://www.avianwaves.com/Forums/g/Profile/u/27656/Textbook1987YetAnotherForum.NETurn:https:--www-avianwaves-com-Forums-aspx:ftPosts:st1:meid7669:1Reverse RDP Attack: Code Execution on RDP Clients<table class="content postContainer_Alt" width="100%"><tr><td>RD Tabs uses the same underlying Microsoft libraries for RDP, so it is as vulnerable as MSTSC is with regards to protocol vulnerabilities. As such, bugs in the protocol layer are also as patched as your local operating system installation is. That is to say, if there is a security vulnerability in Remote Desktop, once you patch Windows using Windows Update, RD Tabs will also be patched.<br /><br />However, the "exploits" shown in the article that MSTSC is vulnerable to are simply taking advantage of valid established functionality, they are not actual security vulnerabilities or bugs. The shared clipboard feature, in particular, binds together the local and remote clipboards by design. That is what the feature is designed to do and as such it should only be used with trusted remote machines. If you are connecting to an untrusted remote desktop, you should not enable any resource sharing at all. This is easy to disable in RD Tabs. Just go to the Resources tab on the connection and uncheck everything under "Redirect Local Resources."</td></tr></table>2019-02-24T20:11:52-05:002019-02-24T20:11:52-05:00Timothy<table class="content postContainer_Alt" width="100%"><tr><td>RD Tabs uses the same underlying Microsoft libraries for RDP, so it is as vulnerable as MSTSC is with regards to protocol vulnerabilities. As such, bugs in the protocol layer are also as patched as your local operating system installation is. That is to say, if there is a security vulnerability in Remote Desktop, once you patch Windows using Windows Update, RD Tabs will also be patched.<br /><br />However, the "exploits" shown in the article that MSTSC is vulnerable to are simply taking advantage of valid established functionality, they are not actual security vulnerabilities or bugs. The shared clipboard feature, in particular, binds together the local and remote clipboards by design. That is what the feature is designed to do and as such it should only be used with trusted remote machines. If you are connecting to an untrusted remote desktop, you should not enable any resource sharing at all. This is easy to disable in RD Tabs. Just go to the Resources tab on the connection and uncheck everything under "Redirect Local Resources."</td></tr></table>urn:https:--www-avianwaves-com-Forums-aspx:ftPosts:st1:meid7662:1Reverse RDP Attack: Code Execution on RDP Clients<table class="content postContainer" width="100%"><tr><td><a rel="nofollow" href="https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" title="https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/">https://research.checkpo...xecution-on-rdp-clients/ <i class="fa fa-external-link-alt fa-fw"></i></a><br /><br />Is RD Tabs vulnerable to this?</td></tr></table>2019-02-06T06:28:06-05:002019-02-06T06:28:06-05:00Textbook1987<table class="content postContainer" width="100%"><tr><td><a rel="nofollow" href="https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/" title="https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/">https://research.checkpo...xecution-on-rdp-clients/ <i class="fa fa-external-link-alt fa-fw"></i></a><br /><br />Is RD Tabs vulnerable to this?</td></tr></table>