Skip to content

RDP scanning tool that is mainly focussed on detecting NLA automatically leaking usernames.

Notifications You must be signed in to change notification settings

mverschu/rdp-scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 

Repository files navigation

RDP scanner

This script scans a given IP or range of IP addresses for the status of Network Level Authentication (NLA) on RDP port 3389.

Screenshots

image

Features

  • Initial scan to identify hosts with port 3389 open using nmap.
  • Detailed scan to check NLA status using rdesktop with an option to run quietly in the background using xvfb-run.
  • Concurrent scanning to speed up the process.

Prerequisites

  • Python 3.6+
  • nmap
  • rdesktop
  • xvfb

Installation on Debian-based systems:

sudo apt-get install nmap rdesktop xvfb
pip install psutil termcolor

Usage

To scan a single IP:

python3 rdp-scanner.py --ip 192.168.1.1

To scan a range of IPs:

python3 rdp-scanner.py --range 192.168.1.0/24

To run in quiet mode (without opening RDP windows):

python3 rdp-scanner.py --range 192.168.1.0/24 --quiet

Options

  • --ip: Single IP address to scan.
  • --range: CIDR range of IP addresses to scan.
  • --quiet: Run the commands in the background without opening RDP windows.

Example

python3 rdp-scanner.py --range 10.0.0.3/24 --quiet

About

RDP scanning tool that is mainly focussed on detecting NLA automatically leaking usernames.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published