Bruteforce and Login
#Enumeration
nmap -sV <ip address>
Results:-
PORT STATE SERVICE VERSION
135/tcp open msrpc Microsoft Windows RPC
139/tcp open netbios-ssn Microsoft Windows netbios-ssn
445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 - 2012 microsoft-ds
3333/tcp open ssl/dec-notes?
49152/tcp open msrpc Microsoft Windows RPC
49153/tcp open msrpc Microsoft Windows RPC
49154/tcp open msrpc Microsoft Windows RPC
49155/tcp open msrpc Microsoft Windows RPC
Service Info: OSs: Windows, Windows Server 2008 R2 - 2012; CPE: cpe:/o:microsoft:windowsRDP's deafult port is 3389 but can be configured to run on other port also here port 3333 is looking like is running RDP
To check whether it is running or not we will use a metasploit module to confrim it
use auxiliary/scanner/rdp/rdp_scanner
set RHOSTS <ip address>
set RPORT 3333
run
Here it detected RDP on Port 3333
#RDP Brute Force
HYDRA
#RDP Login
freerdpcannot be used in this labUse
xfreerdpto connect to target via RDP
Last updated