PNR
Français English Español

Exploit: Ncacn_http

Amadeus Commands Simulation Software

“That’s impossible,” she muttered. The company had spent two million dollars locking down SMB, blocking RPC direct ports, even micro-segmenting the domain controllers. But ncacn_http was the wolf in sheep’s clothing. It let RPC masquerade as a normal web request. And if an attacker had figured out how to weaponize it…

Her coffee went cold.

Maya Chen, a senior incident responder for a global energy firm, stared at the anomaly on her screen. It was a whisper in a hurricane. Between the tsunami of legitimate HTTP traffic flooding port 80 and 443, a single packet was out of place.

NCACN over HTTP. Microsoft’s remote procedure call, wrapped in web traffic to traverse firewalls.

It wasn't the payload that bothered her. It was the protocol .

Demonstration of a complete booking for a family with multiple journeys

with our Amadeus Training Simulator

E-ticket refund demonstration in ATC with our simulator

If you want to learn Amadeus GDS usage

All Amadeus GDS Courses from A to Z

Click to access the courses

Access the courses

Exploit: Ncacn_http

“That’s impossible,” she muttered. The company had spent two million dollars locking down SMB, blocking RPC direct ports, even micro-segmenting the domain controllers. But ncacn_http was the wolf in sheep’s clothing. It let RPC masquerade as a normal web request. And if an attacker had figured out how to weaponize it…

Her coffee went cold.

Maya Chen, a senior incident responder for a global energy firm, stared at the anomaly on her screen. It was a whisper in a hurricane. Between the tsunami of legitimate HTTP traffic flooding port 80 and 443, a single packet was out of place.

NCACN over HTTP. Microsoft’s remote procedure call, wrapped in web traffic to traverse firewalls.

It wasn't the payload that bothered her. It was the protocol .