How to Check Enabled Remote Desktop Service in Network with Metasploit

This module checks a range of hosts for the MS12-020 vulnerability. This does not cause a DoS on the target.

Exploit Targets

Windows PC

Requirement

Attacker: Backtrack 5

Victim PC: Windows 7

Open backtrack terminal type msfconsole

Now type use auxiliary/scanner/rdp/ms12-020_check

msf exploit (ms12-020_check)>set rhosts 192.168.1.1/24 (Target Host Range)

msf exploit (ms12-020_check)>set thread 1

msf exploit (ms12-020_check)>exploit  

2 Comments How to Check Enabled Remote Desktop Service in Network with Metasploit

  1. my.name

    why my msfconsole show “failed to load modules” when i run this command in terminal use ‘auxiliary/scanner/rdp/ms12-020_check’ and other command??? please explain

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *