π₯οΈRDP Attacks
π― Overview
ποΈ RDP Attack Methodology
Attack Chain Overview
Service Discovery β Authentication Attacks β Session Exploitation β Privilege Escalation β Lateral MovementKey Attack Objectives
π Service Discovery & Enumeration
Default RDP Port Detection
Advanced RDP Scanning
Key Information to Extract
βοΈ Authentication Attacks
1. Password Spraying Attacks
Why Password Spraying?
HTB Academy Username List
2. Crowbar Password Spraying
Basic Crowbar Usage
Advanced Crowbar Options
3. Hydra Password Spraying
HTB Academy Hydra Example
Optimized Hydra Commands
π RDP Connection Methods
1. rdesktop Client
rdesktop Advanced Options
2. xfreerdp Client
π€ Protocol Specific Attacks
1. RDP Session Hijacking
Attack Prerequisites
HTB Academy Session Hijacking Example
Alternative Hijacking Methods
2. RDP Pass-the-Hash (PtH) Attack
Attack Prerequisites & Limitations
Enable Restricted Admin Mode
HTB Academy PtH Execution
Alternative PtH Tools
π― HTB Academy Lab Scenarios
Scenario 1: Initial RDP Access
Scenario 2: Registry Key Knowledge
Scenario 3: Administrator Access
π RDP Attack Checklist
Discovery & Enumeration
Authentication Attacks
Post-Authentication
Advanced Techniques
π‘οΈ Defense & Mitigation
RDP Security Hardening
Registry Security
Monitoring & Detection
π Related Techniques
π References
Last updated