| ▲ | brendoelfrendo 2 hours ago | |||||||||||||||||||||||||
What on earth are you talking about? RDP and AD are pretty much orthogonal to each other. You can use an AD account to connect to a domain-joined remote server over RDP, but at that point you're just... logging into a machine, same as any other remote protocol. You prevent bad actors from doing this by not giving them permissions to log in to that server. To call this "code execution" is really odd. Remote code execution as a vulnerability almost always refers to an unintentional behavior in software that allows an attacker to execute arbitrary code as part of that process. Referring to a user logging into a machine with the appropriate permissions and running software as "code execution" is not typical, and is not a vulnerability in any normal sense of the term. | ||||||||||||||||||||||||||
| ▲ | JackSlateur 2 hours ago | parent [-] | |||||||||||||||||||||||||
Because logging to a remote server is not "executing code in that remote server" .. ? Same as any other remote protocol ? Yes. But we are not talking about that, we are talking about active directory, whose main purpose is to authenticate and authorize stuff. Yes, you can configure everything. But just like a wall is better than a door with a lock .. see what I'm saying ? In the AD world, allowing remote code execution is not a bug, it's a feature. Call it a vulnerability if you want; A direct competitor of AD is oauth, which does not allow people to execute code on the issuer Number of cryptolock due to oauth: none (that I know of); As if theory and practice sometimes meet .. I understand that you like AD, and that's fine. The original post was about security and I stand by my point: thinking that we are perfect, that others are doing mistakes but "not us" is not good for security. Neither is playing with fire, as per the vast quantity of burnt people | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||