Windows has a buitin protocol that allows for a psuedo-RDP like session over P2P radio, doesn't kick the current user out, and allows for hardware (keyboard, mouse, etc..) input over an RTSP stream called User Input Back Channel. Is crying in the corner part of your threat model?
I wrote about this feature and technology and included a PCAP here: remyhax.xyz/posts/wifi-dir… Once I wrap up my Bluetooth shenanigans this year, WiFi Direct is my next target.
@_mattata I wonder how that could be useful… who knows 😇🤣
@_mattata You can do it on wired if in the same enterprise network. learn.microsoft.com/en-us/surface-…
@_mattata Crying in the corner has always been my default playbook.. not a threat model
@_mattata Top of my list of stuff I wish I didn’t see before heading to bed..
@_mattata Meanwhile you can defeat Ubuntu secure boot by hitting enter really quickly
@_mattata Can I use that to play my PC games from a different machine?
@_mattata Cool, looks like blocking TCP/UDP 554 and disabling the associated services should help mitigate the issue.
@_mattata @luciascarlet Of course, it’s wireless screen sharing/WFD. If you use that, of course you would want to use TV remotes to act as HID. The way you phrase it makes it sound like the next big exploit, while it is just meant to be just like that.
@_mattata Any way you found to remove this filter from, lets say, Android devices? Could be very useful for wardriving with a service like WiGLE wigle.net/search#fullSea…