Searching for open RDP and using Dubrute. 07-15-2014, 05:15 PM
#1
Does anybody have experiences with this? If so, please let me know, I am interested in learning about using Dubrute.
Searching for open RDP and using Dubrute. filter_list | |
(07-15-2014, 09:40 PM)Ligeti Wrote: Open RDP? or FreeRDP
I googled Dubrute and "About 34,400 results (0.33 seconds)" of which the first two seems to be interesting videos on YouTube about how to hack using Drubrute...
Dubrute sounds interesting (I never heard of it before)... I am reading more about it now
Peace
nmap -sT <ip address> -p 3389
nmap -sU <ip address> -p 3389
(07-15-2014, 11:17 PM)Ligeti Wrote: Ah open RDP ports... I see!
Using nmap of course! I believe it is port 3389 (both TCP and UDP)... to you may want to run something like:
Code:nmap -sT <ip address> -p 3389
And
Code:nmap -sU <ip address> -p 3389
I know nothing about Dubrute (yet not much to talk about it), but generally when you want to scan a port you use or nc, nmap, or any port scanner... the most "famous" one/method is using nmap (or zenmap which is the same but with a nice GUI)
I hope that will help/guide you somehow, please let me know if you need more help/info.
Peace
(07-16-2014, 08:18 PM)Insider Wrote: I don't condone black hat activity, but I'll leave this here. Not sure if it's clean or not, but what you're looking for would be an "RDP" scanner.
Download links in the describtion.
(07-16-2014, 10:08 PM)lady_godiva Wrote:(07-16-2014, 08:18 PM)Insider Wrote: I don't condone black hat activity, but I'll leave this here. Not sure if it's clean or not, but what you're looking for would be an "RDP" scanner.
Download links in the describtion.
Not very correct, as the name states pretty clearly it is a bruteforce tool. It just try to bruteforce credentials for the RDP protocol against target with port 3389.
Quote:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogonwhich requirer the person to hit "OK" to be able to access the CTRL+ALT+DEL option and effective terminate password blasting, well aleast as far as i have heard anyway, please no flamming if am mistaken tough:epic: