Most commonly used among administrators.
Enumeration
Password Spraying
crowbar
hydra
Login
Attacks
RDP Session Hijacking
Let’s say we have successfully log-in to RDP and we have local administrator privilege.
We can hijack other user’s session.
To impersonate a user without their password:
- Need to have SYSTEM privilege
- Use Microsoft tscon.exe binary (tscon.exe allows users to connect to another desktop session)
First use the command query user
and identify the ID of the use we want to impersonate.
After identifying, impersonate:
What if we don’t have SYSTEM privilege? We can escalate our privilege using mimikatz etc or by using sc.exe
.
Now run below and new terminal with the lewen user session will appear:
PtH
Restricted Admin Mode
is needed to be enabled (disabled by default).
We can enable this by adding a new registry key DisableRestrictedAdmin
under HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Lsa
.
Once it is added, log-in: