metasploit

docs link

kali

netdiscover -help

nmap -p- 192.168.1.21 -sV

As we can see above, there are a lot of open ports and services available on the target machine. In the command above, I used the -sV switch for enumerating the version information of the identified services. This will help us identify vulnerable services to exploit.

RDP bruteForce

https://medium.com/swlh/using-hydra-to-spray-user-passwords-dcc12f016ba9

hydra -L user.txt -P pass.txt 10.10.102.10 rdp -u

hydra -L users.txt -P passwords.txt 192.168.0.1 ssh -u

https://github.com/danielmiessler/SecLists/tree/master/Usernames

https://github.com/danielmiessler/SecLists/tree/master/Passwords/Common-Credentials