You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/network-services-pentesting/pentesting-rdp.md
+56-1Lines changed: 56 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,24 @@ nmap --script "rdp-enum-encryption or rdp-vuln-ms12-020 or rdp-ntlm-info" -p 338
24
24
25
25
It checks the available encryption and DoS vulnerability (without causing DoS to the service) and obtains NTLM Windows info (versions).
26
26
27
+
### Security Layer / NLA Checks
28
+
29
+
RDP can negotiate different security layers (native RDP, TLS, or CredSSP/NLA). You can quickly fingerprint the server-side settings and whether NLA is required:
30
+
31
+
```bash
32
+
# Security layer and encryption info
33
+
nmap --script rdp-enum-encryption -p 3389 <IP>
34
+
35
+
# Quick auth check (also reports if NLA is required)
36
+
nxc rdp <IP> -u <user> -p <password>
37
+
38
+
# Pre-auth screenshot only works if NLA is disabled
If **Remote Desktop Services shadowing** is enabled, you can **view or control** another user's active session (sometimes **without consent**) using built-in `mstsc` switches.
114
+
115
+
```bash
116
+
# List sessions on a remote host
117
+
qwinsta /server:<IP>
118
+
quser /server:<IP>
119
+
120
+
# Shadow a specific session (consent required if policy enforces it)
RDP supports **virtual channels** that can be abused for **pivoting/tunneling** over an established RDP session. One option is **rdp2tcp** (client/server) which can multiplex TCP forwards over RDP (works with FreeRDP).
0 commit comments