5.RDP
I. RDP Basics
Function: Provides a graphical interface for remote computer access.
Port: TCP/3389.
Use Cases: System administration, MSPs.
Attack Vectors:
Misconfigurations (weak/no passwords).
Password guessing/spraying.
Session hijacking.
Pass-the-Hash (PtH).
Exploiting vulnerabilities (e.g., BlueKeep).
II. Enumeration
Nmap:
III. Misconfigurations & Password Attacks
Password Spraying:
RDP Login:
IV. Protocol-Specific Attacks
RDP Session Hijacking:
RDP Pass-the-Hash (PtH):
Enable Restricted Admin Mode (registry key):
Authenticate using NT Hash:
V. Latest RDP Vulnerabilities
CVE-2019-0708 (BlueKeep):
RCE vulnerability.
Use-After-Free (UAF) technique.
Triggered by manipulated initialization requests.
Impacts older Windows versions.
Exploitation can cause system instability (BSoD).
Key Commands Summary
Nmap:
Crowbar:
Hydra:
rdesktop:
xfreerdp:
Windows Commands:
Last updated