Cybersecurity · RDP Brute Force Attack and Remote Login

RDP Brute Force Attack and Remote Login

Use Hydra to brute-force RDP on Windows 10, then verify access by logging in with xfreerdp.

View this project on GitHub

Overview

This lab demonstrates a controlled brute-force attack against RDP in a segmented LAN. After enumerating the target, Hydra is used with a wordlist to attempt credential discovery. Upon success, xfreerdp confirms interactive access.

Scan Port 3389 with Nmap

Nmap scan step 1
Nmap scan step 2

Brute Force with Hydra (RDP + rockyou.txt)

Run Hydra against the RDP service using a known username and a wordlist (e.g., rockyou.txt) to attempt password discovery.

Hydra brute force step 1
Hydra brute force step 2
Hydra brute force step 3
Hydra brute force step 4
Hydra brute force step 5
Hydra brute force step 6

Remote Login with xfreerdp

After Hydra identifies valid credentials, initiate an RDP session using xfreerdp to verify access.

Successful login step 1
Successful login step 2
Successful login step 3
Successful login step 4

Back to Home