3389 - RDP
Basic Information
PORT STATE SERVICE
3389/tcp open ms-wbt-serverEnumeration
Automatic
nmap --script "rdp-enum-encryption or rdp-vuln-ms12-020 or rdp-ntlm-info" -p 3389 -T4 <IP>Password Spraying
# https://github.com/galkan/crowbar
crowbar -b rdp -s 192.168.220.142/32 -U users.txt -c 'password123'
# hydra
hydra -L usernames.txt -p 'password123' 192.168.2.143 rdpConnect with known credentials/hash
Check known credentials against RDP services
Attacks
Session stealing
Sticky-keys & Utilman
RDP Process Injection
Adding User to RDP group
Shadow Attack
HackTricks Automatic Commands
Last updated