Remote Desktop Protocol
Remote Desktop Protocol (RDP) enables users and administrators to access systems remotely, but if we can, adversaries can. Add in a set of valid credentials, RDP can allow adversaries to move laterally throughout an organization largely undetected. Learn techniques to outwit adversaries by detecting this behavior and stopping it in its tracks.
What could be wrong with a service that allows users to connect to any machine in the entire environment remotely? The risks of RDP access in the wrong hands are seemingly obvious, but organizations continue to see adversary actions that involve this core technology. Couple this with Valid Credentials and it’s easy to see why this vector is useful for an adversary bent on accomplishing objectives on goal.
Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by financially motivated threat group FIN7. Prevent adversaries from accomplishing the tactic of Lateral Movement in your environment today.
Complete this entire course to earn a Remote Desktop Protocol Certificate of Completion