Back to directory
WRITEUP #3095

Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines and more

RCE
by@sztejnworcel(Gabriel Sztejnworcel)
Program
Microsoft
Published
Jan 11, 2022
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://www.cyberark.com/resources/threat-research-blog/attacking-rdp-from-inside
RELATED WRITEUPS
Vulnerabilities in Open Source C2 Frameworks
RCEOS command injection
[2,500$ Bug Bounty Write-Up] Remote Code Execution (RCE) via unclaimed Node package
RCEDependency confusion
Attacking PowerShell CLIXML Deserialization
DeserializationInsecure deserialization
Zero-Click Calendar invite — Critical zero-click vulnerability chain in macOS
RCEArbitrary file write
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
RCETLD hacking

Built with ❤️ by Shubham Rawat