Skip to content

MayThirtyOne/Shodan-RDP-Exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Shodan-RDP-Exploit

Discovering and exploiting remote hosts running vulnerable versions of Windows distributions

Description

Usually, Windows KVM Virtualization is not supported on several cloud platforms like Digitalocean, OVH, Linode, etc. But some users found a workaround this restriction by booting an unsecured version of Windows distros available at places like WhatUpTime.com. The only problem being, they use a redundant weak password for all their machines. I collected a list of vulnerable machines via the search API at shodan and brute-forced them with the default password. The results were great. I quickly shared my findings with Digitalocean and they took down those machines.

Technologies Used

Python, REST APIs, Hydra(Kali-Linux)

#T hird-Party Services Shodan.io

Cloud Platform

AWS

About

Discovering and exploiting remote hosts running vulnerable versions of Windows distributions

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages