RDP (Remote Desktop Protocol) Pentesting
RDP (Remote Desktop Protocol) Pentesting
Enumeration
nmap --script rdp-enum-encryption -p 3389 <target-ip>
nmap --script rdp-ntlm-info -p 3389 <target-ip>
nmap --script rdp* -p 3389 <target-ip>Brute Force Credentials
hydra -l username -P passwords.txt <target-ip> rdp
hydra -L usernames.txt -p password <target-ip> rdpConnect
Remmina
remmina
# -c: Connect given URI or file
remmina -c rdp://username@vulnerable.com
remmina -c rdp://domain\\username@vulnerable.com
remmina -c rdp://username:password@vulnerable.com
# ---------------------------------------------------------------------------------
# Settings
# Keyboard mapping
1. On Remmina client window, click menu icon and move to "Preferences".
2. Navigate to "RDP" tab and check "Use client keyboard mapping".
3. Reboot RemminaFreeRDP
Rdesktop
PreviousMSRPC (Microsoft Remote Procedure Call) PentestingNextWinRM (Windows Remote Management) Pentesting
Last updated