Further reading
These aids for further study will let you dive deeper into the attacks covered in the chapter:
- The original research behind the SharpRDP tool creation: https://0xthirteen.com/2020/01/21/revisiting-remote-desktop-lateral-movement/
- Dumping RDP credentials with the help of Mimikatz: https://pentestlab.blog/2021/05/24/dumping-rdp-credentials/
- Microsoft documentation about Remote Credential Guard: https://learn.microsoft.com/en-us/windows/security/identity-protection/remote-credential-guard
- Great research published by 0xf0x about Impacket usage and detection: https://neil-fox.github.io/Impacket-usage-&-detection/
- Detailed publication about artifacts left by running remote command execution: https://www.synacktiv.com/publications/traces-of-windows-remote-command-execution.html
- More information about ASR implementation: https://www.joeyverlinden.com/implementing-and-monitoring-attack-surface-reduction-rules-asr/
- Great theory background about...