RDP Sessions Abuse
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Ako spoljašnja grupa ima RDP pristup bilo kojem računaru u trenutnom domenu, napadač bi mogao kompromitovati taj računar i čekati ga.
Kada taj korisnik pristupi putem RDP-a, napadač može preći na sesiju tog korisnika i zloupotrebiti njegove dozvole u spoljašnjem domenu.
Check other ways to steal sessions with other tools in this page.
If a user access via RDP into a machine where an attacker is waiting for him, the attacker will be able to inject a beacon in the RDP session of the user and if the victim mounted his drive when accessing via RDP, the attacker could access it.
In this case you could just compromise the victims original computer by writing a backdoor in the statup folder.
Učite i vežbajte AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Učite i vežbajte GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)