Explosion introduces RDP (Remote Desktop Protocol) — Microsoft's graphical remote access protocol. In this machine, the Administrator account has no password set, allowing direct GUI access to a Windows desktop. RDP with weak or empty credentials is one of the highest-impact findings in external penetration tests.
| Skill | Why it matters |
|---|---|
| Identifying RDP with Nmap | Port 3389 on Windows is always worth probing — many orgs expose it directly to the internet |
| xfreerdp from Linux | The standard RDP client on Kali/Parrot for connecting to Windows targets |
| Empty-password Administrator | A surprisingly common finding — default installs sometimes ship with no admin password |
| GUI post-exploitation | RDP gives an interactive desktop — useful for running tools, exfiltrating data, and pivoting |
What you're seeing: port 3389 is open — the standard RDP port. The rdp-enum-encryption Nmap script confirms it's a genuine Microsoft Terminal Services endpoint, not a honeypot or non-standard service.
Connect using xfreerdp. Attempt the Administrator account with an empty password.
A Windows desktop opens. You now have full GUI access to the machine as Administrator.
| Flag | Meaning |
|---|---|
| /u:<user> | Username to authenticate with |
| /p:<pass> | Password (use "" for empty) |
| /v:<host> | Target IP or hostname |
| /d:<domain> | Domain name for domain accounts |
| /cert:ignore | Skip certificate verification (common on internal targets) |
| /dynamic-resolution | Allow window resizing |
| /drive:kali,/tmp | Mount a local folder inside the RDP session |
/cert:ignore to the command. In real engagements, self-signed RDP certificates are the norm on internal hosts.Once connected, open File Explorer or a Command Prompt and navigate to the Administrator's desktop.
RDP with no password is an instant critical. It's a full graphical shell as an administrator — equivalent to sitting physically in front of the machine.
| Concept | Real-world relevance |
|---|---|
| Empty admin password | Default Windows installs in some environments ship without a set admin password — always try empty before brute-forcing |
| RDP = full GUI access | Unlike a shell, RDP lets you interact with the entire desktop, run GUI tools, and access browser sessions |
| Port 3389 on the internet | External RDP is in the top-5 initial access vectors for ransomware — always flag it as critical |
| Drive mounting in xfreerdp | The /drive flag lets you transfer files in and out of the session without SMB or FTP |
