{"id":4007,"date":"2015-10-15T02:44:36","date_gmt":"2015-10-14T18:44:36","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4007"},"modified":"2015-10-15T02:52:24","modified_gmt":"2015-10-14T18:52:24","slug":"more-drama-about-hillary-clintons-e-mail-leak-vnc-rdp-open","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/10\/more-drama-about-hillary-clintons-e-mail-leak-vnc-rdp-open\/","title":{"rendered":"More Drama About Hillary Clinton’s E-mail Leak – VNC & RDP Open"},"content":{"rendered":"

So this Hillary Clinton’s e-mail leak case has been a pretty interesting phenomena to observe and has been going on since last month, we didn’t really cover it as well it mostly concerns US politics – not a huge area of interest for most.<\/p>\n

But it’s getting more and more interesting, there was a report that 32,000 of Hillary Clinton’s Email for auction<\/a> to the highest bidder.<\/p>\n

\"More<\/p>\n

But it was rather unsubstantiated. Now it’s getting more and more interesting, seeing as though Hillary used a private e-mail server “for convenience” and this server also had VNC and RDP open to the INTERNET. Yah..<\/p>\n

It also includes her using the same e-mail, yes a state department server technically, for personal e-mails.<\/p>\n

Not only did Democratic Party presidential hopeful Hillary Clinton run her own email server while at the State Department: someone, presumably her friendly local sysadmin, decided it needed remote desktop protocol (RDP) and desktop sharing code virtual network computing (VNC) exposed to the Internet.<\/p>\n

The folks at Associated Press were alerted to the situation by a Serbian geek the newswire hasn’t named, but who ran bulk port-scans that happened to include Hillary’s email server.<\/p>\n

The scans came from the anonymous researcher who in 2013 published the white-botnet-driven \u201cInternet census\u201d, AP says.<\/p>\n

Scans of a server that identified itself as clintonemail.com in August and December 2012 showed open ports for RDP and VNC. In March 2012, Microsoft warned that RDP was likely to be attacked, and in October of the same year Verizon warned that RDP’s default Port 3389 was among the most-scanned on the Internet.<\/p><\/blockquote>\n