RDP
I. RDP Fundamentals
Function: Remote Desktop Protocol β GUI access to Windows systems
Port: TCP/3389 (default), UDP/3389 (RD Gateway), custom via registry
Protocol: RDP over TCP (encrypted with CredSSP/NLA)
Use Cases: Admin access, MSPs, VDI, lateral movement in ADAttack Surface Matrix
ββββββββββββββββββββββ¬βββββββββββββββββββββ
β High-Impact Vectorsβ Techniques β
ββββββββββββββββββββββΌβββββββββββββββββββββ€
β Weak Auth β Spraying, Brute β
β NTLM Exposure β Relay, PtH β
β RCE Vulns β BlueKeep, DejaBlue β
β Session Abuse β Hijack, Shadowing β
β Misconfigs β NLA off, RD Gatewayβ
ββββββββββββββββββββββ΄βββββββββββββββββββββII. Enumeration (Passive β Active)
# 1. Port Sweep (Stealth)
nmap -p3389 --open -Pn -n -T2 10.10.10.0/24
# 2. Service Fingerprinting
nmap -Pn -sV -p3389 --script=rdp* <IP>
# 3. Advanced RDP Scripts
nmap -p3389 --script=rdp-enum-encryption,rdp-ntlm-info,rdp-vuln-ms12-020 <IP>
# 4. Check NLA Requirement
nmap -p3389 --script=rdp-nla <IP>
# 5. Metasploit Auxiliaries
use auxiliary/scanner/rdp/rdp_scanner
set RHOSTS <IP>; run
use auxiliary/scanner/rdp/rdp_login
set USER_FILE users.txt; set PASS_FILE pass.txt; runBonus: Shodan/Zoomeye
III. Authentication Attacks
A. Password Spraying (Low & Slow)
B. Credential Dumping (Pre-Auth)
C. Brute Force (High Risk β Use in Labs)
IV. Protocol-Specific Attacks
A. Pass-the-Hash (PtH) β No Password Needed
B. RDP Session Hijacking (Post-Login)
C. RDP Shadowing (Consent Bypass)
D. RDP over RD Gateway (Bypass Firewall)
V. RCE Vulnerabilities (2023β2025)
A. CVE-2019-0708 (BlueKeep) β RCE Pre-Auth
Note: Unstable β causes BSoD. Use on Win7/2008 R2 only.
B. CVE-2019-1181/1182 (DejaBlue) β Wormable
C. CVE-2025-28114 (Hypothetical β Based on Trends)
VI. Post-Exploitation via RDP
A. Credential Harvesting
B. Persistence
C. Lateral Movement
VII. Evasion & Defense Evasion
VIII. Key Commands Summary (Copy-Paste Ready)
Last updated