目錄

攻擊手法-RDP tunneling介紹與防範

介紹

利用受害者電腦對c2 Server建立起ssh連線行,進一步建立tunnel從c2 Server RDP連線至受害者主機。

A Microsoft Windows component, RDP was designed to provide administrators, engineers, and users with remote access to systems. However, threat actors have been using the technology for nefarious purposes, and the trend continues, especially since an RDP attack is usually more difficult to detect than a backdoor. 

說明How it works?

https://i0.wp.com/gbhackers.com/wp-content/uploads/2019/01/Picture1-2.png?w=696&ssl=1

FIG: Enterprise firewall bypass using RDP and network tunneling with SSH as an example

https://i0.wp.com/gbhackers.com/wp-content/uploads/2019/01/Picture2.png?w=696&ssl=1

FIG: Example of successful RDP tunnel created using Plink

https://i1.wp.com/gbhackers.com/wp-content/uploads/2019/01/Picture3.png?w=696&ssl=1

FIG: Example of successful port forwarding from the attacker C2 server to the victim

文章連結

https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html

https://gbhackers.com/threat-actors-conducting-rdp-attacks/

TerminalServices-LocalSessionManager