The RDP Through SSH Encyclopedia

Summary

This article serves as a personal reference for setting up Remote Desktop Protocol (RDP) access through an SSH connection. The author, Carrie Roberts, documents the process to avoid having to re-learn it repeatedly.

IFF Assessment

FRIEND

This article details a technique that can be used by defenders to securely access systems, which is a positive development for cybersecurity.

Defender Context

Understanding how to tunnel RDP over SSH is a valuable defensive technique. It allows administrators to establish secure remote access to systems without exposing RDP ports directly to the internet, thereby reducing the attack surface and mitigating risks associated with RDP vulnerabilities.

Read Full Story →