^.^;

Remote Services

Access remote systems via RDP, WinRM, or SSH. Interactive sessions for lateral movement. More powerful than PSExec.

📖 Theory Panel Active

Remote Services

Lateral Movement via RDP, WinRM, SSH

Requires: Valid credentials • Difficulty: Low • Impact: High

💻 Desktop Experience Available

View this module on desktop for an interactive Remote Services lateral movement simulation.

Remote Services are legitimate Windows services that allow administrators to manage systems remotely. Attackers abuse these services for lateral movement and persistence in Active Directory environments. Common remote services include RDP (Remote Desktop Protocol), WinRM (Windows Remote Management),SSH, and VNC.

How Remote Services Work (Legitimate Use):

  1. Administrator enables remote service (RDP, WinRM, SSH) on target system
  2. Service listens on specific port (RDP: 3389, WinRM: 5985/5986, SSH: 22)
  3. Administrator authenticates with valid credentials
  4. Remote session established, administrator can manage system
  5. Session logged for audit purposes

Attack Exploit:

Attackers use compromised credentials (from Pass-the-Hash, Kerberoasting, etc.) to access remote services on target systems. Once connected, they can execute commands, install persistence mechanisms, and pivot to additional systems. Remote services provide interactive access—more powerful than PSExec or WMI for complex operations.

Why It's Effective: Remote services are essential for IT operations, so they're often enabled and accessible. Many organizations allow RDP/WinRM between systems for management. Attackers can use legitimate tools (mstsc.exe, PowerShell) to establish sessions, making detection more difficult than custom malware.

Legal & Ethical Warning

Remote Services techniques should only be used in authorized penetration testing, red team engagements, or controlled lab environments. Unauthorized access to computer systems is illegal under CFAA and equivalent laws worldwide. Always obtain written permission before testing.

📡 Interactive Simulation Mode

Remote Services

Access remote systems via RDP, WinRM, or SSH. Interactive sessions for lateral movement. More powerful than PSExec.

Remote Service Connections

RDP (3389), WinRM (5985/5986), SSH (22)

Using credentials: CORP\admin

○ IDLE

Remote Service Sessions

Mission Brief

Remote services provide interactive access to target systems. RDP gives graphical desktop, WinRM provides PowerShell remoting, SSH offers command-line access. All require valid credentials but provide more control than PSExec or WMI.

Attack Chain

  1. 1. Obtain Credentials: Pass-the-Hash, Kerberoasting, or credential dumping
  2. 2. Connect: RDP/WinRM/SSH to target system
  3. 3. Authenticate: Use credentials to establish session
  4. 4. Execute: Run commands, install persistence, collect data
  5. 5. Pivot: Use target as jump point to additional systems

Why It Works

  • Legitimate services: RDP/WinRM/SSH are essential for IT operations
  • Often enabled: Many organizations allow remote access for management
  • Interactive access: More powerful than non-interactive methods
  • Pass-the-Hash: Works with NTLM hashes, no password needed
  • Blends with normal use: Harder to detect than custom malware

Common Services

  • RDP: TCP 3389 - Graphical desktop access
  • WinRM: TCP 5985/5986 - PowerShell remoting
  • SSH: TCP 22 - Command-line access
  • VNC: TCP 5900+ - Cross-platform remote desktop
OPSEC: Training only. Unauthorized access to production systems is a federal crime. Remote Services is MITRE ATT&CK technique T1021.
Terms of ServiceLicense AgreementPrivacy Policy
Copyright © 2025 JMFG. All rights reserved.