![]() ![]() Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious.Ĭonsider monitoring processes for tscon. Monitor network data for uncommon data flows. monitor anomalies in use of files that do not normally initiate connections for respective protocol(s)). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments associated to traffic patterns (e.g. Monitor and analyze traffic patterns and packet inspection associated to protocol(s) that do not follow the expected protocol standards and traffic flows (e.g extraneous packets that do not belong to established flows, gratuitous or anomalous traffic patterns, anomalous syntax, or structure). Other factors, such as access patterns and activity that occurs after a remote login, may indicate suspicious or malicious behavior with RDP. Use of RDP may be legitimate, depending on the network environment and how it is used. Monitor service creation that uses cmd.exe /k or cmd.exe /c in its arguments to detect RDP session hijacking. Limit remote user permissions if remote access is necessary. Ĭonsider removing the local Administrators group from the list of groups allowed to log in through RDP. Change GPOs to specify the maximum amount of time that a disconnected session stays active on the RD session host server. ![]() Remove unnecessary accounts and groups from Remote Desktop Users groups.ĭisable the RDP service if it is unnecessary.Įnable firewall rules to block RDP traffic between network security zones within a network.Ĭhange GPOs to define shorter timeouts sessions and maximum amount of time any single session can be active. Īudit the Remote Desktop Users group membership regularly. WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session. Īxiom has targeted victims with remote administration tools including RDP. All of this can be done by using native Windows commands, but it has also been added as a feature in red teaming tools. It can also lead to Remote System Discovery and Privilege Escalation by stealing a Domain Admin or higher privileged account session. This can be done remotely or locally and with active or disconnected sessions. This article will explain what session hijacking is, how it works, and how to prevent it. In a session hijacking attack, a hacker takes control of a user’s browsing session to gain access to their personal information and passwords. With System permissions and using Terminal Services Console, c:\windows\system32\tscon.exe, an adversary can hijack a session without the need for credentials or prompts to the user. Session hijacking is a technique used by hackers to gain access to a target’s computer or online accounts. Typically, a user is notified when someone else is trying to steal their session. Īdversaries may perform RDP session hijacking which involves stealing a legitimate user's remote session. Microsoft refers to its implementation of the Remote Desktop Protocol (RDP) as Remote Desktop Services (RDS). It allows a user to log into an interactive session with a system desktop graphical user interface on a remote system. Remote desktop is a common feature in operating systems. Adversaries may hijack a legitimate user’s remote desktop session to move laterally within an environment.
0 Comments
Leave a Reply. |