In the realm of remote desktop management, evilrdp stands out as a powerful tool designed to provide extended control over RDP connections.
Built on the aardwolf RDP client library, it offers a combination of GUI and command-line functionalities, making it an invaluable asset for both administrators and security professionals.
After installation, evilrdp presents a GUI similar to a standard RDP client alongside an interactive command-line shell. Two sets of commands are available:
mousemove, rightclick, doubleclick, type, typefile, return/enter, invokerun, clipboardset, clipboardsetfile, clipboardget, powershell, and screenshot.pscmdchannel, startpscmd, pscmd, getfile, shell, and socksproxy.To use evilrdp, clone the repository from GitHub and install it using pip:
bashgit clone https://github.com/skelsec/evilrdp.git
pip3 install . evilrdp supports various authentication methods via URL formats, such as Kerberos, NTLM, and plain authentication, allowing for flexible connection setups:
rdp+kerberos-password://TEST\Administrator:Passw0rd!1@win2016ad.test.corp/?dc=10.10.10.2&proxytype=socks5&proxyhost=127.0.0.1&proxyport=1080rdp+ntlm-password://TEST\Administrator:Passw0rd!1@10.10.10.103rdp+ntlm-password://TEST\Administrator:<NThash>@10.10.10.103rdp+plain://Administrator:Passw0rd!1@10.10.10.103evilrdp is a versatile tool that enhances RDP capabilities, offering advanced scripting and automation features.
Its ability to execute commands and manage files remotely makes it a valuable asset for both legitimate system administration and security testing scenarios.
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…