Skip to content

Commit

Permalink
Docs: Add RDP features page
Browse files Browse the repository at this point in the history
  • Loading branch information
shreyamalviya committed Aug 2, 2024
1 parent 0b6aa1c commit e9c9ef0
Show file tree
Hide file tree
Showing 2 changed files with 60 additions and 0 deletions.
60 changes: 60 additions & 0 deletions docs/content/features/exploiters/rdp.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,60 @@
---
title: "RDP Exploiter"
draft: false
description: "Exploits RDP"
tags: ["exploiter", "rdp", "brute force"]
pre: "<i class='fa fa-desktop'></i> "
---

## RDP

[RDP (Remote Desktop Protocol)](
https://learn.microsoft.com/en-us/windows/win32/termserv/remote-desktop-protocol)
is a network communication protocol by Microsoft which enables users to connect
to another computer over a network, providing a remote display and input
capabilities to the user. It is commonly used for remote administration, remote
technical support, and remote work access.

## Exploitation

Machines with RDP enabled may be accessible to attackers if
they come across the correct credentials.

Infection Monkey's RDP exploiter uses brute-force to attempt to
propagate to a victim via RDP.

![RDP Configuration](
/images/island/configuration-page/rdp-exploiter-configuration.png
"RDP Configuration")

### Credentials used

The RDP exploiter can be run from both Linux and Windows attackers and will use
[user-configured credentials](/usage/configuration/credentials) as well as LM or
NT hashes collected from other victims. Different combinations of credentials
are attempted in the following order:

1. **Brute force usernames and passwords** - The exploiter will attempt to use
all combinations of usernames and passwords that were set in the
[configuration](/usage/configuration/credentials) or collected from other
victims.

1. **Brute force usernames and NT hashes** - The exploiter will attempt to use
all combinations of usernames and NT Hashes that were set in the
[configuration](/usage/configuration/credentials) or collected from other
victims.

This only works on Windows 8.1 and Windows Server 2012 R2. You can read more
[here](https://www.kali.org/blog/passing-hash-remote-desktop/).

## Mitigation

1. Change user passwords to complex passwords that are not shared with other
computers on the network.

For information about remediating RDP-related security risks, see
[Microsoft's
guidance](https://www.microsoft.com/en-us/security/blog/2020/04/16/security-guidance-remote-desktop-adoption/)

## See also
- [RDP exploiter reference documentation](/reference/exploiters/rdp)
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit e9c9ef0

Please sign in to comment.