RDP for Cracking!
http://snthostings.com/
๖ۣۜPanda's RDP Cracking Tutorial
Hello and welcome to my RDP cracking tutorial. I've seen a few tutorials on cracking RDP's but never any using this method, so here goes! In this tutorial I will walk through the basics of cracking RDP logins.
To follow this tutorial you will need all of the tools which I have provided below.
Tools Download
Note: These tools will likely come up as a virus in your scanner so run them sandboxed or in a virtual machine if you do not trust them.
So lets get started.
STEP 1 - GETTING A STARTING IP LIST
The first tool we will be using is Nmap. Open up the zip I have provided and extract the contents anywhere you want. Now open up the "Nmap" folder.
Now what we're going to do is go to this website: http://www.maxmind.com/en/geoip_demo
Once you're on the site copy and paste the IP's from "results.txt" into the IP Addresses box on the website and click "Submit". You will now see a list of IP's as well as their location. Pick a location you like and copy the IP.
STEP 2 - SCANNING FOR IP'S TO CRACK
Now we have our starting IP (the one you just copied). Go back to the tools pack I have provided and open up the vnc_scanner_gui folder. Now run "vnc_scanner_gui.exe". Now paste the IP into the big "-i" section and then do a hyphen and copy the IP again but this time replace the last xxx.xxx.xxx with 255.255.255. For example, if my IP was 108.34.245.221 I would type 108.34.245.221-108.255.255.255.
Once you have enough IP's close the cmd prompt and click on "Start parser". Leave it to run for a few seconds before closing the program. All of your IP's will now be in "IPs.txt".
STEP 3 - CRACKING THE RDP'S
And now for the final step.
Go to the "DUBrute2.2" folder in the tool pack I provided.
Run "DUBrute.exe".
Click on "Config" and change the "Thread" setting, I recommend setting it to 100 for most home connections and setting it higher if you're doing this on a VPS with high bandwidth, but don't go over 1000 as this usually causes errors.
Click on "OK"
Click on "Generation"
Click on "File IP" and to the "IPs.txt" file in the "vnc_scanner_gui" folder and click on "Open".
The IP box should now be full of your IPs.
Click on "File login". This is where we choose our usernames to try when cracking the RDP. This time, navigate to the "user.txt" file in the "User + Pass" folder and click "Open".
Now do the same with the passwords. Click on "File Pass" and navigate to the "password.txt" file provided.
That's it! Just click on "Start" to start cracking! It will be slow at first so give it some time. Every time you crack an RDP the "Good" counter will go up by one and the login details will be stored in "good.txt" in the "DUBrute2.2" folder.
Simply use these login details with the Remote Desktop Connection application in Windows.