commands.sh

nxc rdp

all

Pentest and exploit RDP servers.

More info →

Options (2)

-u, --usernameboolean

Search for valid credentials by trying out every combination in the specified lists of usernames and passwords

Example: nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}
-p, --passwordboolean

Search for valid credentials by trying out every combination in the specified lists of usernames and passwords

Example: nxc rdp {{192.168.178.2}} {{[-u|--username]}} {{path/to/usernames.txt}} {{[-p|--password]}} {{path/to/passwords.txt}}

Examples (4)

Search for valid credentials by trying out every combination in the specified lists of usernames and passwords

nxc rdp 192.168.178.2 [-u|--username] path/to/usernames.txt [-p|--password] path/to/passwords.txt

Take a screenshot after waiting the for specified number of seconds

nxc rdp 192.168.178.2 [-u|--username] username [-p|--password] password --screenshot --screentime 10

Take a screenshot in the specified resolution

nxc rdp 192.168.178.2 [-u|--username] username [-p|--password] password --screenshot --res 1024x768

Take a screenshot of the RDP login prompt if Network Level Authentication is disabled

nxc rdp 192.168.178.2 [-u|--username] username [-p|--password] password --nla-screenshot
made by @shridhargupta | data from tldr-pages