The shared clipboard to copy a group of files to the other computer and paste them The attack consists of the server using the feature of In this article is described an attack by an infected server against a clientĬonnecting via RDP. This study was done in collboration with Check Point researcher Eyal Itkin.
This vulnerability is described in the Microsoft articleĪ case study in industry collaboration: Poisoned RDP vulnerability disclosure and response.