AdSense

Friday, June 10, 2016

METASPLOIT - Windows 7 - Remote Desktop Protocol - Weak passwords



WINDOWS 7 - REMOTE DESKTOP PROTOCOL - WEAK PASSWORDS


- Layout for this exercise:





Under similar circumstances than the previous example, the victim Windows 7 allows remote connections at the RDP port TCP 3389, with the less secure option:







- The attacker scans the victim and detects that RDP port 3389 is open





- For the purpose of simplicity, let's create a couple of easy wordlists: UserList and PasswordList.




With the help of both wordlists, ncrack discovers the credentials attacking the RDP port ,open on victim 192.168.1.14: