Explore a chosen-plaintext attack exploiting a logical vulnerability in Windows authentication protocols, particularly focusing on Remote Desktop Protocol (RDP). Delve into the intricacies of network security, examining how attackers can move laterally through systems using various protocols such as Kerberos, MSRPC, GSSAPI/SSPI, TLS, and CredSSP. Understand the RDP flow and certificate validation process, and discover the journey that led to identifying this vulnerability. Learn about RSA encryption, the requirements for public keys, and the process of finding a suitable protocol for exploitation. Follow the presenters' attempts to exploit NTLM and Kerberos, leading to a successful attack. Gain insights into the affected systems, patch details, and disclosure timeline. Acquire knowledge about relevant tools and key takeaways to enhance your understanding of this critical security issue in Windows authentication protocols.
Server Tailgating - A Chosen-Plaintext Attack on RDP