Lazy-RDP : Script For AutomRDPatic Scanning And Brute-Force

Lazy-RDP is a Script for automatic scanning of the address list for the presence of open 3389 ports, and then selecting the method and starting busting pair login / password.

The script is tuned for Kali linux 2.0, Kali linux 2016.2 и Kali linux 2017.1, 2017.2 systems and higher versions .

To work correctly, the script requires the establishment: masscan, curl and FreeRDP.

The current version is 1.32.

  • Added: support XFCE, support Parrot Security OS, auto-update, scanner selection (Nmap) from the list, to scan local addresses from the range of 127.0.0.1/8, the ability to specify the scanned port. Fixed bug of false positives. Fixed a crash bug when selecting a script of some countries from the list. Fixed a bug with incorrect paths. Added English. Fixed a bug with brute force menu. Completely changed the tool to brute force. Added Hydra 9.0. Added function to automatically detect the operating system language. Optimized script code. Added automatic installation and configuration dependencies (freerdp-X11, freerdp2-x11, masscan) to work correctly in the “SANA” and “ROLLING”. Added a feature to st art the script with X11_OVER_SSH.

Installation

  • Setting

git clone https://github.com/getdrive/Lazy-RDP
cd Lazy-RDP && chmod +x hydra/configure hydra/hydra src/rdp_brute.sh patator.py start INSTALL

  • Installing dependencies

./INSTALL

  • Running the script

./start

Demo Video

Lazy-RDP over SSH:

Disclaimer

This script must be used only for educational purposes and Pentesting. Use it only on your own networks. Author is not responsible of its use.

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

7 days ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

7 days ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

7 days ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago