GeorgeBanu
  • About me
  • Pentesting CheatSheets
    • Information Gathering
    • Ports Enumeration
      • FTP-21
      • SSH-22
      • Telnet-23
      • SMTP - 25,465,587
      • DNS-53
      • NetBIOS, SMB - 139,445
      • SNMP-161
      • MySQL-3306
      • RDP-3389
      • WinRM-5985
    • Web Cheat Sheet
    • Privilege Escalation
      • Linux Enumeration
      • Linux Privesc Techniques
    • Tricks
    • Template
  • TryHackMe Writeups
    • Starter
    • Dreaming
    • ColddBox: Easy
    • Ollie
    • Blog
    • KoTH Hackers
    • Brooklyn Nine Nine
    • Chill Hack
    • Undiscovered
    • Archangel
    • Jason
    • GLITCH
    • VulnNet: Node
    • Road
    • VulnNet:Internal
    • W1seGuy
  • CyberEDU Writeups
    • flag-is-hidden
    • file-crawler
    • reccon
    • this-file-hides-something
    • wifiland
    • old-tickets
    • inodat
    • pattern
    • ultra-crawl
  • eJPT
Powered by GitBook
On this page
  1. Pentesting CheatSheets
  2. Ports Enumeration

RDP-3389

Default Port

PORT     STATE SERVICE
3389/tcp open  ms-wbt-server

Scan

  • nmap

nmap --script="rdp-*" -T4 -p 3389 -sV  $IP -oN recon/rdp_port
  • metasploit

msfconsole

msf5 > use auxiliary/scanner/rdp/rdp_scanner
msf5 auxiliary(scanner/rdp/rdp_scanner) > set RHOSTS $IP
msf5 auxiliary(scanner/rdp/rdp_scanner) > set RPORT $port
msf5 auxiliary(scanner/rdp/rdp_scanner) > run

Brute Force

hydra -L /usr/share/metasploit-framework/data/wordlists/common_users.txt -P /usr/share/metasploit-frramework/data/wordlists/unix_passwords.txt rdp://$IP

Connect

xfreerdp /u:$username /p:$password /v:$IP:$port
PreviousMySQL-3306NextWinRM-5985

Last updated 1 year ago