= 2nd memory =

2020년 6월 17일 수요일

Bypassing Network Restrictions Through RDP Tunneling / Hidden Reverse RDP

Bypassing Network Restrictions Through RDP Tunneling / Hidden Reverse RDP


https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html

http://fireeyekorea.blog.me/221470622815

https://koromoon.blogspot.com/2019/01/rdp.html

https://snort.org/rule_docs/1-49040

https://www.fireeye.com/blog/threat-research/2018/04/establishing-a-baseline-for-remote-desktop-protocol.html


작성자: treefrug 시간: 수요일, 6월 17, 2020
라벨: Security

댓글 없음:

댓글 쓰기

최근 게시물 이전 게시물 홈
피드 구독하기: 댓글 (Atom)

태그

  • Android (6)
  • Apple (3)
  • Application (3)
  • Entertain (3)
  • Entertain_Game (5)
  • ETC (4)
  • Hardware (5)
  • IT_ICT (14)
  • Linux_Unix (7)
  • Network (16)
  • Policy (7)
  • Policy_Security (15)
  • Privacy (9)
  • Program (14)
  • Security (76)
  • Security_Solution (10)
  • Security_Web (2)
  • Software_Dev (6)
  • Windows (15)
깔끔 테마. Powered by Blogger.