Skip to content

Latest commit

 

History

History
28 lines (15 loc) · 1017 Bytes

lateral-movement-over-headless-rdp-with-sharprdp.md

File metadata and controls

28 lines (15 loc) · 1017 Bytes

Lateral Movement over headless RDP with SharpRDP

Executing commands on a remote host is possible by using a headless (non-GUI) RDP lateral movement technique brought by a tool called SharpRDP.

Execution

Executing a binary on a remote machine dc01 from a compromised system with offense\administrator credentials:

SharpRDP.exe computername=dc01 command=calc username=offense\administrator password=123456

Observations

Defenders may want to look for mstscax.dll module being loaded by suspicious binaries on a compromised host from which SharpRDP is being executed:

Also, weird binaries making connections to port 3389:

References

{% embed url="https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3?gi=fe80458d82a5" %}