I am using 2 forms of remote access to my Windows Server 2008 machine, both go t
ID: 659227 • Letter: I
Question
I am using 2 forms of remote access to my Windows Server 2008 machine, both go to the Admin account since we only use it to host a Minecraft (MC) Server.
Remote Desktop, that goes over a custom port instead of standard, which has a scope to only allow connections from certain IP addresses, and of course the hardware firewall doing the same thing.
Teamviewer (up-to-date), which has a whitelist, does not accept connections with a random password, and has a password if you want to change settings in TV.
My question is, Is it possible to spoof your Teamviewer ID and gain access to a Teamviewer enabled machine?
This is because as a MC server, we attract a lot of Skiddies, and had few DDoS/DoS attacks and hacking attempts before, and we want to make sure no one can damage the machine itself.
I considered also scoping the Teamviewer App in Windows firewall, and scope the hardware firewall to certain IP addresses too, but the reason we have TV is to gain access when we are NOT at home, thus connecting from different IP addresses each time, so that would not be a move we want to take.
Are there any more things I could do to protect myself from unauthorized server access? We do not host anything else than the MC server, and the only apps that are not blocked by our firewall are a few plugins for the MC server, MC itself, the browser, TV, remote access and windows updates, the rest is nailed shut.
Explanation / Answer
To the best of my knowledge the TeamViewer ID is provided by the TeamViewer servers. The attacker would have to emulate the entire TeamViewer protocol in order to spoof the ID. They would have to act as both the TeamViewer servers in the middle, as well as connecting client itself in order to make your system believe that it was a legitimate TeamViewer connection.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.