sessions
ts::sessions
can be used to list the current RDP sessions. It comes in handy for RDP hijacking.
Upon executing ts::sessions
the following users are identified to be connected over RDP:
hacklab\m3g9tr0n
(Session: 3 - RDP-Tcp#4)hacklab\Administrator
(Session: *4 - RDP-Tcp#5)
The asterisk on the Session: *4 - RDP-Tcp#5
** **indicates the user via whom the ts::sessions
is executed.
Another interesting thing to pay attention is the lock field (It can be leveraged for RDP lateral movement). When a user has his/her monitor locked, then the following will be displayed:
(Demonstration target is a Windows Server 2016 Essentials)
Last updated