Practical Network Scanning
上QQ阅读APP看书,第一时间看更新

Secure and encrypt remote access

SSH uses the cryptography process running at the backend, and therefore is considered very secure. However, you still need to harden this service as well. Make sure you are running the latest version of SSH protocol, and SSH sources can be further restricted with IP subnet. Remote Desktop sessions operate over an encrypted channel, preventing anyone from snooping your session on the network. However, there is a vulnerability in the method used to encrypt sessions in earlier versions of RDP. The best approach would be to update your software, restrict access using firewalls, and set an account lockout policy for additional security. You can also change your RDP port from 3389 to something else, using RDP gateways and then finally using 2FA.