Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application

License

NotificationsYou must be signed in to change notification settings

p0dalirius/RDWAtool

Repository files navigation

banner

A python all-in-one tool to extract information, spray and bruteforce passwords on a Microsoft Remote Desktop Web Access (RDWA) application.
GitHub release (latest by date)YouTube Channel Subscribers

This python tool allows to extract various information from a Microsoft Remote Desktop Web Access (RDWA) application, such as the FQDN of the remote server, the internal AD domain name (from the FQDN), and the remote Windows Server version

Usage

$ rdwatool -h           ____  ____ _       _____   __              __          / __ \/ __ \ |     / /   | / /_____  ____  / /         / /_/ / / / / | /| / / /| |/ __/ __ \/ __ \/ /    @podalirius_        / _, _/ /_/ /| |/ |/ / ___ / /_/ /_/ / /_/ / /         /_/ |_/_____/ |__/|__/_/  |_\__/\____/\____/_/      v2.0    usage: rdwatool recon [-h] [-tf TARGETS_FILE] [-tu TARGET_URLS] [-v] [--no-colors] [--debug] [-T THREADS] [-PI PROXY_IP] [-PP PROXY_PORT] [-rt REQUEST_TIMEOUT] [-k] [-L] [--export-xlsx EXPORT_XLSX] [--export-json EXPORT_JSON]                      [--export-sqlite EXPORT_SQLITE]options:  -h, --help            show this help message and exit  -v, --verbose         Verbose mode. (default: False)  --no-colors           Disable colored output. (default: False)  --debug               Debug mode, for huge verbosity. (default: False)  -T THREADS, --threads THREADS                        Number of threads (default: 250)Targets:  -tf TARGETS_FILE, --targets-file TARGETS_FILE                        Path to file containing a line by line list of targets.  -tu TARGET_URLS, --target-url TARGET_URLS                        Target URL of the RDWA login page.Advanced configuration:  -PI PROXY_IP, --proxy-ip PROXY_IP                        Proxy IP.  -PP PROXY_PORT, --proxy-port PROXY_PORT                        Proxy port  -rt REQUEST_TIMEOUT, --request-timeout REQUEST_TIMEOUT                        Set the timeout of HTTP requests.  -k, --insecure        Allow insecure server connections when using SSL (default: False)  -L, --location        Follow redirects (default: False)Export results:  --export-xlsx EXPORT_XLSX                        Output XLSX file to store the results in.  --export-json EXPORT_JSON                        Output JSON file to store the results in.  --export-sqlite EXPORT_SQLITE                        Output SQLITE3 file to store the results in.

Demonstration

demo.mp4

Example of output

  • Inrecon mode:

    rdwatool recon -tf ./subdomains.txt

  • Inspray mode:

    rdwatool spray -tu https://rds.podalirius.net/RDWeb/Pages/en-US/login.aspx

  • Inbrute mode:

    rdwatool brute -tu https://rds.podalirius.net/RDWeb/Pages/en-US/login.aspx

Contributing

Pull requests are welcome. Feel free to open an issue if you want to add other features.

How it works

Getting information about the remote server

There is much pre-filled information on thelogin.aspx page of the Remote Desktop Web Access (RDWA) application. In the input fieldsWorkSpaceID and/orRedirectorName we can find the FQDN of the remote server, andWorkspaceFriendlyName can contain a text description of the workspace.

<formid="FrmLogin"name="FrmLogin"action="login.aspx?ReturnUrl=%2FRDWeb%2FPages%2Fen-US%2FDefault.aspx"method="post"onsubmit="return onLoginFormSubmit()"><inputtype="hidden"name="WorkSpaceID"value="DC01.lab.local"/><inputtype="hidden"name="RDPCertificates"value="E7100C72B6C11A5D14DE115D801E100C79143C19"/><inputtype="hidden"name="PublicModeTimeout"value="20"/><inputtype="hidden"name="PrivateModeTimeout"value="240"/><inputtype="hidden"name="WorkspaceFriendlyName"value="Workspace%20friendly%20name%20or%20description"/><inputtype="hidden"name="EventLogUploadAddress"value=""/><inputtype="hidden"name="RedirectorName"value="DC01.lab.local"/><inputtype="hidden"name="ClaimsHint"value=""/><inputtype="hidden"name="ClaimsToken"value=""/><inputname="isUtf8"type="hidden"value="1"/><inputtype="hidden"name="flags"value="0"/>...</form>

The rdwatool tool automatically parses this form and extract all the information.

OS version banner image

If the remote RDWeb installation is not hardened, there is a high chance that the default version image file/RDWeb/Pages/images/WS_h_c.png is still accessible (even if not linked on the login page). This is really awesome as we can compare its sha256 hash value directly with a known table of the windows banners of this service:

Windows OSSHA256 hashBanner
Windows Server 2008 R25a8a77dc7ffd463647987c0de6df2c870f42819ec03bbd02a3ea9601e2ed8a4b
Windows Server 2012 R24560591682d433c7fa190c6bf40827110e219929932dc6dc049697529c8a98bc
Windows Server 2012 R23d9b56811a5126a6d3b78a692c2278d588d495ee215173f752ce4cbf8102921c
Windows Server 2016fb1505aadeab42d82100c4d23d421f421c858feae98332c55a4b9595f4cea541
Windows Server 20163dbbeff5a0def7e0ba8ea383e5059eaa6acc37f7f8857218d44274fc029cfc4b
Windows Server 20192da4eb15fda2b7c80a94b9b2c5a3e104e2a9a2d9e9b3a222f5526c748fadf792
Windows Server 2022256a6445e032875e611457374f08acb0565796c950eb9c254495d559600c0367

The rdwatool tool automatically gets this file and compare its hash to get the remote Windows Server version.

References

About

A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application

Topics

Resources

License

Stars

Watchers

Forks

Sponsor this project

  •  

Contributors3

  •  
  •  
  •  

[8]ページ先頭

©2009-2025 Movatter.jp