Files
blue-team-tools/rules
Vasiliy Burov a2b309404b Create win_rdp_session_hijacking.yml
Adversaries may perform RDP session hijacking which involves stealing a legitimate user's remote session. Typically, a user is notified when someone else is trying to steal their session and prompted with a question. With System permissions and using Terminal Services Console, c:\windows\system32\tscon.exe [session number to be stolen], an adversary can hijack a session without the need for credentials or prompts to the user. This can be done remotely or locally and with active or disconnected sessions. It can also lead to Remote System Discovery and Privilege Escalation by stealing a Domain Admin or higher privileged account session.
2019-02-27 17:52:20 +03:00
..
2019-02-21 09:54:01 +01:00
2018-11-15 08:45:25 +03:00
2019-02-12 10:33:33 +01:00
2019-01-22 08:49:10 +01:00