Enumerate Active Windows Sessions
When connecting to a Windows server via GUI interface (local connection or RDP) a windows session will be created. These session can be listed using the following option
nxc smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --qwinsta
Note that if a session if found, an attacker will be able to:
Impersonate the primary token for that user (if credentials are stored in memory) ;
Run tasks on behalf of that user.
Sometimes you'll end up having to hunt for a specific user which can be done filling the username you are looking for:
nxc smb 192.168.1.0/24 -u UserNAme -p 'PASSWORDHERE' --qwinsta username
Last updated
Was this helpful?