Alpha Software Mobile Development Tools:   Alpha Anywhere    |   Alpha TransForm subscribe to our YouTube Channel  Follow Us on LinkedIn  Follow Us on Twitter  Follow Us on Facebook

Announcement

Collapse

The Alpha Software Forum Participation Guidelines

The Alpha Software Forum is a free forum created for Alpha Software Developer Community to ask for help, exchange ideas, and share solutions. Alpha Software strives to create an environment where all members of the community can feel safe to participate. In order to ensure the Alpha Software Forum is a place where all feel welcome, forum participants are expected to behave as follows:
  • Be professional in your conduct
  • Be kind to others
  • Be constructive when giving feedback
  • Be open to new ideas and suggestions
  • Stay on topic


Be sure all comments and threads you post are respectful. Posts that contain any of the following content will be considered a violation of your agreement as a member of the Alpha Software Forum Community and will be moderated:
  • Spam.
  • Vulgar language.
  • Quotes from private conversations without permission, including pricing and other sales related discussions.
  • Personal attacks, insults, or subtle put-downs.
  • Harassment, bullying, threatening, mocking, shaming, or deriding anyone.
  • Sexist, racist, homophobic, transphobic, ableist, or otherwise discriminatory jokes and language.
  • Sexually explicit or violent material, links, or language.
  • Pirated, hacked, or copyright-infringing material.
  • Encouraging of others to engage in the above behaviors.


If a thread or post is found to contain any of the content outlined above, a moderator may choose to take one of the following actions:
  • Remove the Post or Thread - the content is removed from the forum.
  • Place the User in Moderation - all posts and new threads must be approved by a moderator before they are posted.
  • Temporarily Ban the User - user is banned from forum for a period of time.
  • Permanently Ban the User - user is permanently banned from the forum.


Moderators may also rename posts and threads if they are too generic or do not property reflect the content.

Moderators may move threads if they have been posted in the incorrect forum.

Threads/Posts questioning specific moderator decisions or actions (such as "why was a user banned?") are not allowed and will be removed.

The owners of Alpha Software Corporation (Forum Owner) reserve the right to remove, edit, move, or close any thread for any reason; or ban any forum member without notice, reason, or explanation.

Community members are encouraged to click the "Report Post" icon in the lower left of a given post if they feel the post is in violation of the rules. This will alert the Moderators to take a look.

Alpha Software Corporation may amend the guidelines from time to time and may also vary the procedures it sets out where appropriate in a particular case. Your agreement to comply with the guidelines will be deemed agreement to any changes to it.



Bonus TIPS for Successful Posting

Try a Search First
It is highly recommended that a Search be done on your topic before posting, as many questions have been answered in prior posts. As with any search engine, the shorter the search term, the more "hits" will be returned, but the more specific the search term is, the greater the relevance of those "hits". Searching for "table" might well return every message on the board while "tablesum" would greatly restrict the number of messages returned.

When you do post
First, make sure you are posting your question in the correct forum. For example, if you post an issue regarding Desktop applications on the Mobile & Browser Applications board , not only will your question not be seen by the appropriate audience, it may also be removed or relocated.

The more detail you provide about your problem or question, the more likely someone is to understand your request and be able to help. A sample database with a minimum of records (and its support files, zipped together) will make it much easier to diagnose issues with your application. Screen shots of error messages are especially helpful.

When explaining how to reproduce your problem, please be as detailed as possible. Describe every step, click-by-click and keypress-by-keypress. Otherwise when others try to duplicate your problem, they may do something slightly different and end up with different results.

A note about attachments
You may only attach one file to each message. Attachment file size is limited to 2MB. If you need to include several files, you may do so by zipping them into a single archive.

If you forgot to attach your files to your post, please do NOT create a new thread. Instead, reply to your original message and attach the file there.

When attaching screen shots, it is best to attach an image file (.BMP, .JPG, .GIF, .PNG, etc.) or a zip file of several images, as opposed to a Word document containing the screen shots. Because Word documents are prone to viruses, many message board users will not open your Word file, therefore limiting their ability to help you.

Similarly, if you are uploading a zipped archive, you should simply create a .ZIP file and not a self-extracting .EXE as many users will not run your EXE file.
See more
See less

Here is a method to block RDP hacking attempts

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    Here is a method to block RDP hacking attempts

    I have been looking for some method to block the tens of thousands of brute force hacking attempts on the couple servers where I host Alpha Five web apps. Its not that I think they will ever hack my password, but when they hit it takes up more than half of my CPU with several attempts per second over a sustained period of time. If you are not familiar with this kind of attack, go to Computer Management on your server, find the Event log for Security and look for a ton of Audit Failure records. Most of the attempts are to gain access to my Remote Desktop service.

    Anyway, the product is RDPGuard and found at http://rdpguard.com/

    Simple concept - if someone hits my server X times with a bad username/password it blocks their IP for X hours.
    Steve Wood
    See my profile on IADN


    #2
    Re: Here is a method to block RDP hacking attempts

    Sounds like a great solution Steve. We will download the trial version and test it.
    Affordable Alpha Five, PHP, MySQL Hosting.
    Serving Webmasters since 2000.ZebraHost

    Comment


      #3
      Re: Here is a method to block RDP hacking attempts

      Here is an example only 8 hours after I installed the RDP blocker. On the left are about 20 Audit Failure's and on the right the five hacker IP's. RDPGuard blocked them after 4 or 5 failed attempts. Without the blocker in place, there would be many, many thousands of Audit Failures by now, each of them stealing a bit of performance from my users.

      Since I think it is useful, if anyone wants to purchase this item, I quickly built an "Other Products" page on IADN. This will be for 3rd party utilities, not built by Alpha Five Developers.

      The address is: http://www.alphadevnet.com/other_products.a5w
      Attached Files
      Steve Wood
      See my profile on IADN

      Comment


        #4
        Re: Here is a method to block RDP hacking attempts

        Hi Steve

        It is a great solution, I have it on a couple of VPS's and it works!
        Glen Schild



        My Blog

        Comment


          #5
          Re: Here is a method to block RDP hacking attempts

          It is funny how we trust everything that is in net. We install software and try it without knowing anything about company and their background. The company has been since 2007 but where are other products? RDPGuard seems quite new product. Although Idea is good behind this software I must say I don't have courage to install and try it.

          Comment


            #6
            Re: Here is a method to block RDP hacking attempts

            Ken,
            The correct ANSWER you sholuld NOT TRUST anything on WWW.
            Issue in this part that users (administrators)on vps trust MS what is a fake trust
            the problem is not new see msdn august 2011, or simple Google.
            Beside this even "RDPGuard will hold fake users", if your running OOA php versions on your server(s) without patches installed incl. to Mysql even RDPGuard has no means.
            Perhaps >97% of your systems services are secure and the rest needs detailed attention

            m2p

            Comment


              #7
              Re: Here is a method to block RDP hacking attempts

              I guess you have choose who to trust. So far RDPGuard has blocked 45 IP addresses of hackers trying to brute-force hack in to my Remote Desktop. That is roughly 200,000 hit on my website that have been thwarted. It would probably take 100 million brute-force attempts on my RDP to guess the password (I should run a contest), but if any of those actually DID crack my Remote Desktop, my data would be exposed.

              RDPGuard has no way to send any information out of my server if that is what you are thinking. I would have to add it as an outbound exception to my Firewall.
              Steve Wood
              See my profile on IADN

              Comment


                #8
                Re: Here is a method to block RDP hacking attempts

                RDP really should not be publicly exposed anyway. At a minimum, RDP access should only be allowed from known source IP addresses, but you really should have a VPN in front of anything like RDP.

                Lenny Forziati
                Vice President, Internet Products and Technical Services
                Alpha Software Corporation

                Comment


                  #9
                  Re: Here is a method to block RDP hacking attempts

                  Lenny, yes every place I looked said VPN or to change the RDP port. I pushed those aside to find the lazy man's solution. My experience with VPN (via clients) has always been a pain, is there a decent not-such-a-pain VPN solution?
                  Steve Wood
                  See my profile on IADN

                  Comment


                    #10
                    Re: Here is a method to block RDP hacking attempts

                    There are alternatives like teamviewer.com free for non commercial use that as optional serieus alternative between basic RDP and a VPN backend.
                    Setup VPN can be a pain in the xxx for most average basic vps users but Lenny is correct as he mentioned in his last post at least use a certificate between client and host on Windows basic RDP. You can install this from the Windows Management Console. Allow only remote access from known remote ip is not a full safeguard unless work from your office 24/7. If your "home" office cable provider provides semi-dynamic ip adress your lost or you need access to your vps from a ipad (out of office) the connection is refushed based on your remote VPS config settings at the vps.
                    Last edited by bea2701; 06-04-2012, 02:25 PM.

                    Comment


                      #11
                      Re: Here is a method to block RDP hacking attempts

                      Thank you for this information.

                      I went ahead and looked at our Audit Success entries in the Security Event.
                      I see some "anonymous logons" as below from machines all over the world.

                      Does anyone know what this means?

                      An account was successfully logged on.

                      Subject:
                      Security ID: NULL SID
                      Account Name: -
                      Account Domain: -
                      Logon ID: 0x0

                      Logon Type: 3

                      New Logon:
                      Security ID: ANONYMOUS LOGON
                      Account Name: ANONYMOUS LOGON
                      Account Domain: NT AUTHORITY
                      Logon ID: 0x1f670141
                      Logon GUID: {00000000-0000-0000-0000-000000000000}

                      Process Information:
                      Process ID: 0x0
                      Process Name: -

                      Network Information:
                      Workstation Name: TJASERVER
                      Source Network Address: 200.87.35.194 (from Bolivia)
                      Source Port: 3229

                      Detailed Authentication Information:
                      Logon Process: NtLmSsp
                      Authentication Package: NTLM
                      Transited Services: -
                      Package Name (NTLM only): NTLM V1
                      Key Length: 128

                      This event is generated when a logon session is created. It is generated on the computer that was accessed.

                      The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.

                      The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).

                      The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.

                      The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.

                      The authentication information fields provide detailed information about this specific logon request.
                      - Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
                      - Transited services indicate which intermediate services have participated in this logon request.
                      - Package name indicates which sub-protocol was used among the NTLM protocols.
                      - Key length indicates the length of the generated session key. This will be 0 if no session key was requested.

                      -------------------------------------------------------------------------------------------

                      An account was successfully logged on.

                      Subject:
                      Security ID: NULL SID
                      Account Name: -
                      Account Domain: -
                      Logon ID: 0x0

                      Logon Type: 3

                      New Logon:
                      Security ID: ANONYMOUS LOGON
                      Account Name: ANONYMOUS LOGON
                      Account Domain: NT AUTHORITY
                      Logon ID: 0x1f557845
                      Logon GUID: {00000000-0000-0000-0000-000000000000}

                      Process Information:
                      Process ID: 0x0
                      Process Name: -

                      Network Information:
                      Workstation Name: SERVERACGDB2
                      Source Network Address: 31.195.162.51 (from Italy)
                      Source Port: 4326

                      Detailed Authentication Information:
                      Logon Process: NtLmSsp
                      Authentication Package: NTLM
                      Transited Services: -
                      Package Name (NTLM only): NTLM V1
                      Key Length: 0

                      -----------------------------------------------------------------------------------

                      An account was successfully logged on.

                      Subject:
                      Security ID: NULL SID
                      Account Name: -
                      Account Domain: -
                      Logon ID: 0x0

                      Logon Type: 3

                      New Logon:
                      Security ID: ANONYMOUS LOGON
                      Account Name: ANONYMOUS LOGON
                      Account Domain: NT AUTHORITY
                      Logon ID: 0x1fa787d4
                      Logon GUID: {00000000-0000-0000-0000-000000000000}

                      Process Information:
                      Process ID: 0x0
                      Process Name: -

                      Network Information:
                      Workstation Name: PCOS-10250653
                      Source Network Address: 110.211.83.27 (from China)
                      Source Port: 39558

                      Detailed Authentication Information:
                      Logon Process: NtLmSsp
                      Authentication Package: NTLM
                      Transited Services: -
                      Package Name (NTLM only): NTLM V1
                      Key Length: 0
                      Richard
                      --------------------------------------------------------
                      Find the Good and Praise It
                      Alex Haley

                      Comment


                        #12
                        Re: Here is a method to block RDP hacking attempts

                        Rich,

                        check the ip# from the eventlog into RDPGuard grid view is there a row with that acc ip and status blocked ? if not you might [ i say not you have]have a guest on your system change the passwords with very strong passwords and a minimal length of 8# remove any not needed user from the system at least "guest", setup a second systemadministrator user as fallbackup RUN YOUR ANTIVIRUS SOFTWARE TO SCAN YOU ENTIRE SYSTEM.
                        check the system eventlog or application are there any logevent with the subject "jsshell.php" ? it will search for "proxyserver.* php is PHP installed on iis or apache?
                        check the A5 access error log file can you see that "red" ip in the log file?

                        contact me if you need any further help

                        Eric
                        check the log in you anti virus application

                        Comment


                          #13
                          Re: Here is a method to block RDP hacking attempts

                          Thanks Eric. I will try to do that.

                          I had not yet installed the RDPGuard, I sort of wanted to run some system checks first of all.

                          This is actually a Zebrahosted server with Windows SB2008. IIS is running, but not in use.
                          Password was 10 characters long, have doubled it.

                          Nothing else is installed apart from the A5 Appserver. No PHP at all.

                          We had just started doing some online tests, luckily our web application is benign, nothing much to steal, but nobody wants a compromised host.

                          Any idea what kind of logons these are and whether they would be expected in such a setting?
                          Security ID: ANONYMOUS LOGON
                          Account Name: ANONYMOUS LOGON
                          Account Domain: NT AUTHORITY
                          Logon ID: 0x1fa787d4
                          Richard
                          --------------------------------------------------------
                          Find the Good and Praise It
                          Alex Haley

                          Comment


                            #14
                            Re: Here is a method to block RDP hacking attempts

                            In fact the A5 appserver is more stable for security then most people think or know, simple follow the security rules and guidelines.
                            Install the trial from RDPGuard do a crossref check from the eventlog versus blocked.
                            I am in contact with Clive from Zebrahosting to find out this is the correct tool.
                            Nothing to steal ? even if the appsserver is secure but your backend DB is not then what? so by example there is the need to have your mysql port open at the vps firewall then anyone can try to connect or are you using a proxy DB to prevent backend sql injections because the only user is full grant "Root" other example My company stores credit card info "that is save in the backend" but is your vps/system PCI/DSL level 4-1 compliant. To complete take steps by full complementation and safeguards rules, if you have other questions send pm.

                            tx
                            Last edited by bea2701; 06-05-2012, 07:42 PM.

                            Comment


                              #15
                              Re: Here is a method to block RDP hacking attempts

                              I must say I did buy the product. What did convince me was their ultimately S3 client.

                              Comment

                              Working...
                              X