Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork17
A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application
License
p0dalirius/RDWAtool
Folders and files
| Name | Name | Last commit message | Last commit date | |
|---|---|---|---|---|
Repository files navigation
A python all-in-one tool to extract information, spray and bruteforce passwords on a Microsoft Remote Desktop Web Access (RDWA) application.
This python tool allows to extract various information from a Microsoft Remote Desktop Web Access (RDWA) application, such as the FQDN of the remote server, the internal AD domain name (from the FQDN), and the remote Windows Server version
$ rdwatool -h ____ ____ _ _____ __ __ / __ \/ __ \ | / / | / /_____ ____ / / / /_/ / / / / | /| / / /| |/ __/ __ \/ __ \/ / @podalirius_ / _, _/ /_/ /| |/ |/ / ___ / /_/ /_/ / /_/ / / /_/ |_/_____/ |__/|__/_/ |_\__/\____/\____/_/ v2.0 usage: rdwatool recon [-h] [-tf TARGETS_FILE] [-tu TARGET_URLS] [-v] [--no-colors] [--debug] [-T THREADS] [-PI PROXY_IP] [-PP PROXY_PORT] [-rt REQUEST_TIMEOUT] [-k] [-L] [--export-xlsx EXPORT_XLSX] [--export-json EXPORT_JSON] [--export-sqlite EXPORT_SQLITE]options: -h, --help show this help message and exit -v, --verbose Verbose mode. (default: False) --no-colors Disable colored output. (default: False) --debug Debug mode, for huge verbosity. (default: False) -T THREADS, --threads THREADS Number of threads (default: 250)Targets: -tf TARGETS_FILE, --targets-file TARGETS_FILE Path to file containing a line by line list of targets. -tu TARGET_URLS, --target-url TARGET_URLS Target URL of the RDWA login page.Advanced configuration: -PI PROXY_IP, --proxy-ip PROXY_IP Proxy IP. -PP PROXY_PORT, --proxy-port PROXY_PORT Proxy port -rt REQUEST_TIMEOUT, --request-timeout REQUEST_TIMEOUT Set the timeout of HTTP requests. -k, --insecure Allow insecure server connections when using SSL (default: False) -L, --location Follow redirects (default: False)Export results: --export-xlsx EXPORT_XLSX Output XLSX file to store the results in. --export-json EXPORT_JSON Output JSON file to store the results in. --export-sqlite EXPORT_SQLITE Output SQLITE3 file to store the results in.demo.mp4
In
reconmode:rdwatool recon -tf ./subdomains.txt
In
spraymode:rdwatool spray -tu https://rds.podalirius.net/RDWeb/Pages/en-US/login.aspx
In
brutemode:rdwatool brute -tu https://rds.podalirius.net/RDWeb/Pages/en-US/login.aspx
Pull requests are welcome. Feel free to open an issue if you want to add other features.
There is much pre-filled information on thelogin.aspx page of the Remote Desktop Web Access (RDWA) application. In the input fieldsWorkSpaceID and/orRedirectorName we can find the FQDN of the remote server, andWorkspaceFriendlyName can contain a text description of the workspace.
<formid="FrmLogin"name="FrmLogin"action="login.aspx?ReturnUrl=%2FRDWeb%2FPages%2Fen-US%2FDefault.aspx"method="post"onsubmit="return onLoginFormSubmit()"><inputtype="hidden"name="WorkSpaceID"value="DC01.lab.local"/><inputtype="hidden"name="RDPCertificates"value="E7100C72B6C11A5D14DE115D801E100C79143C19"/><inputtype="hidden"name="PublicModeTimeout"value="20"/><inputtype="hidden"name="PrivateModeTimeout"value="240"/><inputtype="hidden"name="WorkspaceFriendlyName"value="Workspace%20friendly%20name%20or%20description"/><inputtype="hidden"name="EventLogUploadAddress"value=""/><inputtype="hidden"name="RedirectorName"value="DC01.lab.local"/><inputtype="hidden"name="ClaimsHint"value=""/><inputtype="hidden"name="ClaimsToken"value=""/><inputname="isUtf8"type="hidden"value="1"/><inputtype="hidden"name="flags"value="0"/>...</form>
The rdwatool tool automatically parses this form and extract all the information.
If the remote RDWeb installation is not hardened, there is a high chance that the default version image file/RDWeb/Pages/images/WS_h_c.png is still accessible (even if not linked on the login page). This is really awesome as we can compare its sha256 hash value directly with a known table of the windows banners of this service:
The rdwatool tool automatically gets this file and compare its hash to get the remote Windows Server version.
About
A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application
Topics
Resources
License
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Sponsor this project
Uh oh!
There was an error while loading.Please reload this page.
Uh oh!
There was an error while loading.Please reload this page.
Contributors3
Uh oh!
There was an error while loading.Please reload this page.










