• port: 3389 (TCP)
  • gets you remote desktop access to windows systems
  • stands for Remote Desktop Protocol

checklist:

  • Weak Credentials / Bruteforce
    • Spray with hydra, ncrack, or xfreerdp + wordlist
    • Watch out for lockout policies or account lock triggers
  • NLA (Network Level Authentication) Bypass
    • Some older boxes or CVEs (e.g., BlueKeep, CVE-2019-0708) allow bypassing auth entirely
    • BlueKeep gives full RCE via malformed RDP packets
  • Clipboard / Drive Redirection
    • Once in, exfil using copy-paste or mapped drives
    • Try RDP clients with /drive: or clipboard sync features to pull loot
  • DLL Hijacking via Shared Folders
    • Drop a malicious DLL in a shared folder and trigger an app to load it
    • Works well if you have partial file access or user drops your DLL somewhere dumb
  • Credential Dumping
    • Post-login, run tools like mimikatz, lsa secrets, or reg save + offline parsing
    • RDP often lands you in a juicy user context, sometimes even SYSTEM
  • Lateral Movement
    • Use credentials or tokens to pivot via PsExec, wmiexec, RDP, or WinRM
    • Check mstsc recent connections, cached creds, RDP history
  • Session Hijacking
    • If another user is logged in, tscon lets you hijack their session:
      • tscon <session id> /dest:console
  • Screenloggers & Keyloggers
    • Drop tools like screenlogger.exe or setup auto-start registry keys
    • Useful if you want creds or screenshots over time
  • RDP Tarpit / Honeypot Detection
    • Watch for weird latency, pixel-perfect login screens, or lack of clipboard sync
    • Tools like RDPY or Cowrie might be tricking you
  • RDP Client Vulns
    • Some RDP clients (esp. old FreeRDP or rdesktop) have RCE bugs
    • Be careful when connecting to shady boxes—they can reverse the shell :)
  • Cached Credentials Abuse
    • Windows caches creds for fast login—dump HKLM\SYSTEM\CurrentControlSet\Control\Lsa
    • Use tools like creddump, secretsdump.py for offline loot
  • MS-RDP HTML5 Clients
    • Stuff like Guacamole, FreeRDP-Web, etc. might be running as web interfaces
    • Check for default creds, XSS, or unauth RDP launches
  • Firewall or NAC Bypass
    • Some RDP servers accept connections only from internal IPs
    • Try tunneling (e.g., chisel, ssh -D, ngrok) to bounce in