![Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys](https://www.cyberark.com/wp-content/uploads/2022/01/tsk-hero.jpeg)
Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys
![Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys](https://www.cyberark.com/wp-content/uploads/2022/01/proc-rds-client-comm.png)
Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys
![Rapid7's Impact from Apache Commons Text Vulnerability (CVE-... - vulnerability database | Vulners.com Rapid7's Impact from Apache Commons Text Vulnerability (CVE-... - vulnerability database | Vulners.com](https://blog.rapid7.com/content/images/2022/11/emergent-threats-series-hero-background.jpg)
Rapid7's Impact from Apache Commons Text Vulnerability (CVE-... - vulnerability database | Vulners.com
![Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys](https://www.cyberark.com/wp-content/uploads/2022/01/tsvcpipe-change-handles.png)
Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys
![Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys](https://www.cyberark.com/wp-content/uploads/2022/01/rdpdr-wide-1.png)
Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys
GitHub - s1ckb017/PoC-CVE-2022-26809: PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.
GitHub - Big5-sec/cve-2022-21877: a demonstration PoC for CVE-2022-21877 (storage spaces controller memory leak)
![Reports of ProxyNotShell Vulnerabilities Being Actively Exploited (CVE-2022-41040 and CVE-2022-41082) Reports of ProxyNotShell Vulnerabilities Being Actively Exploited (CVE-2022-41040 and CVE-2022-41082)](https://socradar.io/wp-content/uploads/2022/12/proxynotshell-1-1024x503.png)
Reports of ProxyNotShell Vulnerabilities Being Actively Exploited (CVE-2022-41040 and CVE-2022-41082)
![Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys](https://www.cyberark.com/wp-content/uploads/2022/01/pipelist-wide.png)
Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys
![Remote Desktop Protocol Remote Code Execution Vulnerability – CVE-2022-21893 - Security Investigation Remote Desktop Protocol Remote Code Execution Vulnerability – CVE-2022-21893 - Security Investigation](https://www.socinvestigation.com/wp-content/uploads/2022/01/Remote-Desktop-Protocol-Remote-Code-Execution-Vulnerability-CVE-2022-21893-768x378.jpg)
Remote Desktop Protocol Remote Code Execution Vulnerability – CVE-2022-21893 - Security Investigation
![Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys](https://embed-ssl.wistia.com/deliveries/38da4a5a559863f6c6ecadf368f01e5536481a14.webp?image_crop_resized=1280x720)