Monitor Rogue Remote Access Solutions on Your Network

Updated

As of release 1.15.3, Rumble Network Discovery now detects the TeamViewer protocol on your network in addition to the existing coverage for RDP, VNC, SPICE, and PC Anywhere. This rounds off Rumble's broad support for monitoring remote access solutions.

AD-Controlled RDP is Great, but Unmanaged RDP is a Risk Factor #

Remote Desktop Protocol (RDP) is a useful tool when enabled on a machine that's properly managed on the domain (that is if you're properly managing local accounts). However, RDP can also put you at risk if active on a machine that's not in your domain. It's typically tough to find those, but with Rumble you can.

In your Rumble Console, go to Explore, then scroll down to the Domain Membership Report and select Report Only RDP:

Report on Domain Membership Via RDP

What you should be seeing is a lot of machines that are on your domain and then a long tail of machines that are not part of your domain:

Report on Domain Membership Via RDP

Let's assume that your local domain is "stolpi.local", you can set up a query for all devices that run RDP but are not on your domain as follows:

alive:t and protocol:rdp and not domain:stolpi.local

Report on Domain Membership Via RDP

How to Find Other Rogue Remote Access Solutions on Your Network #

While remote access solutions are not bad per se, you'll want to keep a close eye on the network to ensure that you don't have any rogue remote access solutions running. Let's say your corporate standard is VNC, you'll probably want to find and alert on any RDP and TeamViewer protocols showing up on your network, and getting alerts on new VNC hosts on your network.

Here's how you use Rumble to find remote protocols being used on your network, even if they are running on non-standard ports:

In your Rumble Console, click on Inventory in the left navigation and use the following search queries to find these remote desktop solutions:

  • Microsoft Remote Desktop Protocol: protocol:rdp
  • VNC Viewer: protocol:vnc
  • TeamViewer: protocol:teamviewer
  • SPICE: protocol:spice
  • PC Anywhere: protocol:pca

To find all of these at the same time in Rumble, you can use this query:

protocol:rdp or protocol:vnc or protocol:teamviewer or protocol:spice or protocol:pca

You should be seeing something like this:

Finding Remote Access Solutions on Your Network

Clicking on a random host in this list and scrolling down to the Protocol section, we see that VNC is active on this machine:

Finding VNC on Your Network

Try Finding Remote Access Solutions on Your Network with Rumble #

If you haven't had a chance to try runZero, or would like to find remote access solutions on your internal network, sign up for a free trial and let us know what you think!

Written by Chris Kirsch

Chris Kirsch is a co-founder of runZero. Chris started his career at an InfoSec startup in Germany and has since worked for PGP, nCipher, Rapid7, and Veracode. He has a passion for OSINT and Social Engineering. In 2017, he earned the Black Badge for winning the Social Engineering Capture the Flag competition at DEF CON, the world’s largest hacker conference.

More about Chris Kirsch
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Related Articles

runZero Research
Active Asset Discovery in OT networks: runZero and the NREL/CECA Report
The Cohort 2 report describes how runZero safely discovers devices in a large, complex OT/ICS environment. Learn more about runZero's discovery...
runZero Research
AI in CAASM: The Risks of LLM Data in Security-Critical Workflows
Current generation AI tools provide appealing answers but struggle with a crucial challenge: knowing the truth, which poses great security risks.
runZero Research
SSHamble: Unexpected exposures in the Secure Shell
We conducted a deep dive into the SSH ecosystem and identified vulnerabilities across a wide range of implementations. During the research process,...
runZero Research
Attack Surface Challenges with OT/ICS and Cloud Environments
Learn why successfully navigating changes to operational technology and cloud attack surfaces is critical for successful asset security.

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

© Copyright 2024 runZero, Inc. All Rights Reserved