githubEdit

5. RDP

I. RDP Basics

  • Function: Provides a graphical interface for remote computer access.

  • Port: TCP/3389.

  • Use Cases: System administration, MSPs.

  • Attack Vectors:

    • Misconfigurations (weak/no passwords).

    • Password guessing/spraying.

    • Session hijacking.

    • Pass-the-Hash (PtH).

    • Exploiting vulnerabilities (e.g., BlueKeep).

II. Enumeration

  • Nmap:

nmap -Pn -p3389 <target_IP>

III. Misconfigurations & Password Attacks

  • Password Spraying:

crowbar -b rdp -s <target_IP>/32 -U <user_list> -c <password>
hydra -L <user_list> -p <password> <target_IP> rdp
  • RDP Login:

IV. Protocol-Specific Attacks

  • RDP Session Hijacking:

  • RDP Pass-the-Hash (PtH):

  • Enable Restricted Admin Mode (registry key):

  • Authenticate using NT Hash:

V. Latest RDP Vulnerabilities

  • CVE-2019-0708 (BlueKeep):

    • RCE vulnerability.

    • Use-After-Free (UAF) technique.

    • Triggered by manipulated initialization requests.

    • Impacts older Windows versions.

    • Exploitation can cause system instability (BSoD).

Key Commands Summary

  • Nmap:

  • Crowbar:

  • Hydra:

  • rdesktop:

  • xfreerdp:

  • Windows Commands:

Last updated