Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

He Said, She Said – Poisoned RDP Offense and Defense

Black Hat via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
Explore a Black Hat conference talk that delves into a unique Remote Desktop Protocol (RDP) vulnerability, focusing on how connecting to a rogue machine can silently compromise your host. Learn about the Microsoft Terminal Services Client (MSTSC.EXE) vulnerabilities, understand the concept of PoisonRDP, and discover the intricacies of RDP clients, protocols, and potential security risks. Gain insights into lazy lateral movement techniques, clipboard vulnerabilities, file copy exploits, and eavesdropping methods. Examine the role of HyperV in testing and the importance of bug bounty programs. Discover new detection methods, including event tracing, RDP connection providers, and clipboard providers. Analyze detection logic, file creation events, and techniques for identifying malicious behaviors. Conclude with valuable lessons learned and a Q&A session to deepen your understanding of RDP offense and defense strategies.

Syllabus

Introduction
Overview
Lazy Lateral Movement
RDP
What is Poison
RDP Clients
Open Source
RDP Protocol
Vulnerability List
Parsing bitmaps
RDP Client
Clipboard
Blacklists
File Copy
File descriptor
Path level cell
Clipboard synchronized
eavesdropping
pasted on
HyperV
Behind the Scenes
HyperV Test
WDD
Bug Bounty Program
New Detection
Event Tracing
RDP Connection Provider
Clipboard Provider
Demo
Detection logic
File creation events
File creation timestamps
Detecting malicious behaviors
Update
Lessons Learned
Questions

Taught by

Black Hat

Reviews

Start your review of He Said, She Said – Poisoned RDP Offense and Defense

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.