
Although called a Bruteforce, it is more like a dictionary attack. There is a long list of tools that can be used to perform a Bruteforce attack but one of the most reliable tools that can make the job done is Hydra. In a process of performing a penetration test on the Remote Desktop service, after the Nmap scan, it is time to do a Bruteforce Attack. It is also able to extract the System Name of the Machine, it is MSEDGEWIN10. It can be observed that the Windows machine with IP Address 192.168.1.41 has Remote Desktop Service successfully. By default, the port that the Remote Desktop service runs on is port 3389. Since we have enabled the Remote Desktop service on our Windows Machine, it is possible to verify the service running on the device by performing a Nmap Port Scan. For the time being, we are enabling the Service as shown in the image below.

This section can be used to Enable or Disable the Remote Desktop Service. However, inside the Remote Tab, we see that there is a section labeled as Remote Desktop.

It can also be verified that the System that we working on is Windows 10 Enterprise Edition.Ĭlicking on the Remote Setting option, we see that a small window opens. After traversing inside this section, in the left-hand side menu, there exists a Remote Settings option as depicted in the image below. Inside this section, there is a System Section. Inside the Control Panel of the System, there exists a System and Security Section. If the service is disabled on the system, it can be enabled using the following steps. The Remote Desktop Service is no exception to this. In a network environment, it is a best practice to disable the services that are not being used as they can be the potential cause for a compromise.


RDP servers are built into Windows operating systems by default, the server listens on TCP port 3389. Table of Contentįrom Wikipedia Remote Desktop Protocol (RDP) also known as “Terminal Services Client” is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. Through that, we are trying to explain how an attacker can breach security in a different- different scenario and what types of the major step should take by admin while activating RDP services to resist against attack. In this article, we are discussing Remote Desktop penetration testing in four scenarios.
