![Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys](https://embed-ssl.wistia.com/deliveries/9c51f0cdf0ce430cf2698897e14a7df98337d1eb.webp?image_crop_resized=1280x720)
Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file sys
![Attack Chain Series: Remote Access Service Compromise Part 1 — RDS | by Vartai Security | Vartai Security | Medium Attack Chain Series: Remote Access Service Compromise Part 1 — RDS | by Vartai Security | Vartai Security | Medium](https://miro.medium.com/v2/resize:fit:1400/1*dfFHkanOOBUhuD308PSV4A.png)
Attack Chain Series: Remote Access Service Compromise Part 1 — RDS | by Vartai Security | Vartai Security | Medium
![Attack Chain Series: Remote Access Service Compromise Part 1 — RDS | by Vartai Security | Vartai Security | Medium Attack Chain Series: Remote Access Service Compromise Part 1 — RDS | by Vartai Security | Vartai Security | Medium](https://miro.medium.com/v2/resize:fit:1400/1*EhKRtTXc4lFHzhctLQSwNg.png)
Attack Chain Series: Remote Access Service Compromise Part 1 — RDS | by Vartai Security | Vartai Security | Medium
![Attack Chain Series: Remote Access Service Compromise Part 1 — RDS | by Vartai Security | Vartai Security | Medium Attack Chain Series: Remote Access Service Compromise Part 1 — RDS | by Vartai Security | Vartai Security | Medium](https://miro.medium.com/v2/resize:fit:1400/1*bDMJ9LyKN2l4iD61yabNfg.png)