3389 - Pentesting RDP
Last updated
Last updated
Resources :
The Remote Desktop Protocol (RDP) is a protocol developed by Microsoft for remote access to a computer running the Windows operating system. This protocol allows display and control commands to be transmitted via the GUI encrypted over IP networks. RDP works at the application layer in the TCP/IP reference model, typically utilizing TCP port 3389 as the transport protocol. However, the connectionless UDP protocol can use port 3389 also for remote administration.
It checks the available encryption and DoS vulnerability (without causing DoS to the service) and obtains NTLM Windows info (versions).
we can use --packet-trace
to track the individual packages and inspect their contents manually. We can see that the RDP cookies
(mstshash=nmap
) used by Nmap to interact with the RDP server can be identified by threat hunters
and various security services such as (EDR
) which can lock us down.
A Perl script named has also been developed by that can unauthentically identify the security settings of RDP servers based on the handshakes.