remote
ts::remote
can be used to perform RDP takeover/hijacking of active sessions. It has the following arguments:
/id
: The active RDP session id to hijack. It can be found withts::sessions
./target
: It connects another session to the target ID, not your own/current session./password
: The password of the target RDP user. It is not required when running asNT AUTHORITY\SYSTEM
.
Experiments showed the ts::remote
, even running as SYSTEM
, was not working against Windows Server 2019 Standard 1809, OS Build 17763.737. The password of the user to takeover was requested.
(Demonstration target is a Windows Server 2016 Essentials)
Last updated