[ Hacker Night School ] :: Got a foothold on a Windows target? Now enable Remote Desktop.

Windows Remote Desktop
This entry is part 12 of 17 in the series [ Hacker Night School ]

This is post 10 of 17 in the series “[ Hacker Night School ]” Want to make your life easier once you’ve gotten a foothold on your Windows target? Enable Remote Desktop. See this article: https://www.interfacett.com/blogs/how-to-remotely-enable-and-disable-rdp-remote-desktop/ TL;DR: In cmd.exe: Reg add “\\computername\HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server”  /v fDenyTSConnections /t REG_DWORD /d /f In Powershell: Invoke-Command –Computername “server1”, “Server2” –ScriptBlock …

[ Pen Testing Windows ] :: Penetration Testing Windows: Powershell/Empire


This is post 3 of 3 in the series “[ Pen Testing Windows ]” Powershell Powershell is the object-oriented replacement for the ancient Windows cmd.exe. It it not present on all installations of Windows, but can be added via a download from Microsoft. There are five versions of Powershell at the moment (2018). You can …