RAdmin. Do you know that…

    Do you know that radmin versions prior to 2.2 allow brute-force passwords to be scanned across a network at a speed limited by the channel and machine power? They say that in 2.2 they corrected , did not check.

    Did you know that in radmin versions prior to 2.2 when authorizing with a password, the client actually sends a hash of the password that the server keeps open in the registry, so the “patched” client can connect using the stolen key.

    Did you know that in radmin version 2.1 (I don’t know further) the zlib library with the ancient leaky version is used?

    Did you know that radmin uses proprietary encryption algorithms that wonderfully match Twofish ?

    Do you know that there are really (and you can dig up a bit of searching) ActiveX components that search the radmin password on an arbitrary amount of IP and check the computer registry for the radmin password hash on which they are executed?

    Do you know that there are ready-made perl scripts that enumerate the password for radmin?

    Here it is.

    Also popular now: