remote
Last updated
Last updated
ts::remote
can be used to perform RDP takeover/hijacking of active sessions. It has the following arguments:
/id
: The active RDP session id to hijack. It can be found with .
/target
: It connects another session to the target ID, not your own/current session.
/password
: The password of the target RDP user. It is not required when running as NT AUTHORITY\SYSTEM
.
Experiments showed the ts::remote
, even running as SYSTEM
, was not working against Windows Server 2019 Standard 1809, OS Build 17763.737. The password of the user to takeover was requested.
(Demonstration target is a Windows Server 2016 Essentials)