How can you attack or redirect the client from the server over an RDP or SSH conneciton? [closed]

I have a penetration testing scenario where I am on the network with two machines, Machine A and Machine B. I have complete control over Machine B and am trying to leverage that to get access to Machine A. Machine A appears to be some vari… Continue reading How can you attack or redirect the client from the server over an RDP or SSH conneciton? [closed]

What are the ways to attack the client if you have full control of the server, over an RDP or SSH connection?

I am not sure whether I accurately captured this question with the title, so let me explain it.
I have a penetration testing scenario where I am on the network with two machines, Machine A and Machine B. I have complete control over Machin… Continue reading What are the ways to attack the client if you have full control of the server, over an RDP or SSH connection?

Defending against Windows RDP attacks

In 2020, attacks against Windows Remote Desktop Protocol (RDP) grew by 768%, according to ESET. But this shouldn’t come as a surprise, given the massive increase in people working remotely during the pandemic. With enterprises resorting to making RDP s… Continue reading Defending against Windows RDP attacks

"Crowbar" brute-force tool giving "success" result to every username/password combination for RDP [closed]

I am trying to use "Crowbar" to brute-force RDP login information. The command I am running (on Kali Linux) is:
sudo crowbar -b rdp -U usernames.txt -C rdp_passlist.txt -s <Target IP>

and the result is Crowbar saying every… Continue reading "Crowbar" brute-force tool giving "success" result to every username/password combination for RDP [closed]

Threat landscape for industrial automation systems. Statistics for H2 2020

We continued our observations and identified a number of trends that could, in our opinion, be due to circumstances connected with the pandemic in one way or another, as well as the reaction of governments, organizations and people to these circumstances. Continue reading Threat landscape for industrial automation systems. Statistics for H2 2020