Windows: Insecure RDP Service
Lab Environment
In this lab environment, you will be provided with GUI access to a Kali machine. The target machines will be accessible at demo.ine.local running a vulnerable RDP service.
Objective: To fingerprint the running RDP service, then exploit the vulnerability using the appropriate method and retrieve the flag!.
Note: rdesktop will not work on this setup as it does not support NLA. Please use xfreerdp to connect to the RDP server.
Dictionaries to use:
/usr/share/metasploit-framework/data/wordlists/common_users.txt
/usr/share/metasploit-framework/data/wordlists/unix_passwords.txt
Tools
The best tools for this lab are:
Nmap
searchsploit
msfconsole
xfreerdp
Writeup
Last updated