RDP-3389

Default Port

PORT     STATE SERVICE
3389/tcp open  ms-wbt-server

Scan

  • nmap

nmap --script="rdp-*" -T4 -p 3389 -sV  $IP -oN recon/rdp_port
  • metasploit

msfconsole

msf5 > use auxiliary/scanner/rdp/rdp_scanner
msf5 auxiliary(scanner/rdp/rdp_scanner) > set RHOSTS $IP
msf5 auxiliary(scanner/rdp/rdp_scanner) > set RPORT $port
msf5 auxiliary(scanner/rdp/rdp_scanner) > run

Brute Force

hydra -L /usr/share/metasploit-framework/data/wordlists/common_users.txt -P /usr/share/metasploit-frramework/data/wordlists/unix_passwords.txt rdp://$IP

Connect

xfreerdp /u:$username /p:$password /v:$IP:$port

Last updated