top of page

Explosion - Windows

  • justinblawitz
  • Oct 7, 2025
  • 1 min read
  • Ping and nmap target Ip using sudo nmap -sV {target Ip}


  • We find a couple open ports, with port 3389/tcp open being the most interesting. This port is usually used for Windows Remote Desktop and Remote Assistance connections (over RDP – Remote Desktop Protocol).


  • Use xfreerdp3 /v:{target Ip} without providing a username or password (/v:         {target Ip} : specifies the target Ip of the host we would like to connect to). But our username is not accepted.


  • Next, we try using common default accounts like user, admin etc. using xfreerdp3 /v:{target Ip} /cert:ignore /u:Administrator and a blank password gains us access (/cert:ignore : specifies to the scripts that all security certificate usage should be ignored, /u:Administrator : specifies the login username to be “Administrator”)


  • On the desktop of the machine, we now have remote access to is a file with the flag inside, read the contents and capture the flag.

 
 
 

Comments


bottom of page