Saturday, June 17, 2017

[TUT] RDP Cracking Tutorial

NOTE: IT IS NOT RECOMMENDED TO DO THIS ON YOUR HOME CONNECTION, USE A VPS OR ANOTHER RDP

RDP for Cracking!
http://snthostings.com/

๖ۣۜPanda's RDP Cracking Tutorial

Hello and welcome to my RDP cracking tutorial. I've seen a few tutorials on cracking RDP's but never any using this method, so here goes! In this tutorial I will walk through the basics of cracking RDP logins.
To follow this tutorial you will need all of the tools which I have provided below.

Tools Download

Note: These tools will likely come up as a virus in your scanner so run them sandboxed or in a virtual machine if you do not trust them.

So lets get started.

STEP 1 - GETTING A STARTING IP LIST

The first tool we will be using is Nmap. Open up the zip I have provided and extract the contents anywhere you want. Now open up the "Nmap" folder.


Now run "nmap-6.40-setup.exe". This will install Nmap to your PC. Once installation has finished run "scanner.bat". Two cmd prompts will open up. This will basically scan for random RDP's and then save the IP's to "results.txt". Keep checking "results.txt" and when you have around 20 IP's close the two cmd prompts.

Now what we're going to do is go to this website: http://www.maxmind.com/en/geoip_demo
Once you're on the site copy and paste the IP's from "results.txt" into the IP Addresses box on the website and click "Submit". You will now see a list of IP's as well as their location. Pick a location you like and copy the IP.

STEP 2 - SCANNING FOR IP'S TO CRACK

Now we have our starting IP (the one you just copied). Go back to the tools pack I have provided and open up the vnc_scanner_gui folder. Now run "vnc_scanner_gui.exe". Now paste the IP into the big "-i" section and then do a hyphen and copy the IP again but this time replace the last xxx.xxx.xxx with 255.255.255. For example, if my IP was 108.34.245.221 I would type 108.34.245.221-108.255.255.255.


Now click on "Start scan" and a cmd prompt will open up. You will want to leave this running for a while to scan IP's.


Leave it scanning until you have enough IP's, I recommend at least 5,000 for best results.
Once you have enough IP's close the cmd prompt and click on "Start parser". Leave it to run for a few seconds before closing the program. All of your IP's will now be in "IPs.txt".


STEP 3 - CRACKING THE RDP'S

And now for the final step.
Go to the "DUBrute2.2" folder in the tool pack I provided.
Run "DUBrute.exe".
Click on "Config" and change the "Thread" setting, I recommend setting it to 100 for most home connections and setting it higher if you're doing this on a VPS with high bandwidth, but don't go over 1000 as this usually causes errors.
Click on "OK"
Click on "Generation"
Click on "File IP" and to the "IPs.txt" file in the "vnc_scanner_gui" folder and click on "Open".
The IP box should now be full of your IPs.
Click on "File login". This is where we choose our usernames to try when cracking the RDP. This time, navigate to the "user.txt" file in the "User + Pass" folder and click "Open".
Now do the same with the passwords. Click on "File Pass" and navigate to the "password.txt" file provided.


Click on "Make", then "OK", then "Exit".
That's it! Just click on "Start" to start cracking! It will be slow at first so give it some time. Every time you crack an RDP the "Good" counter will go up by one and the login details will be stored in "good.txt" in the "DUBrute2.2" folder.
Simply use these login details with the Remote Desktop Connection application in Windows.
Share:

Related Posts: