With the increasing adoption of remote work and cloud infrastructures, the number of people accessing corporate information systems across the internet has skyrocketed. Many of these systems leverage Remote Desktop Protocol (RDP) and Secure Shell (SSH) for interaction and management. As a result, the number of assets that employees connect to from untrusted networks has jumped. As with so many things in security, the addition of convenience and complexity has made protecting these systems far more challenging.
Rapid7 recently analysed a year’s worth of username and password data, with over tens of millions of connection attempts to our RDP and SSH honeypots. After observing 512,002 unique passwords across our RDP and SSH honeypots, we want to share our findings with you.
Join this webcast, where we’ll discuss the following:
- What has changed in RDP since 2016
- How the most complete, well-known dictionary used by attackers compares to the corpus of passwords in our honeypots
- Recommendations to help organisations do better with passwords