[rwth-security] Rogue RDP – Revisiting Initial Access Methods