Overview
This lab demonstrates a controlled brute-force attack against RDP in a segmented LAN. After enumerating the target, Hydra is used with a wordlist to attempt credential discovery. Upon success, xfreerdp confirms interactive access.
Scan Port 3389 with Nmap
Brute Force with Hydra (RDP + rockyou.txt)
Run Hydra against the RDP service using a known username and a wordlist (e.g., rockyou.txt) to attempt password discovery.
Remote Login with xfreerdp
After Hydra identifies valid credentials, initiate an RDP session using xfreerdp to verify access.