Medusa rdp


The Remote Desktop Protocol is often underestimated as a possible way to break into a system during a penetration test. Other services, such SSH and VNC are more likely to be targeted and exploited using a remote brute-force password guessing attack. For example, let’s suppose that we are in the middle of a penetration testing … Medusa is a speedy, massively parallel, modular, login brute-forcer for network services. Some of the key features of Medusa are: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. What is interesting about the encryption process that is performed by MedusaLocker is that the ransomware virus skips files that include the .dll, .sys, .exe, .ini, .lnk, .rdp, .encrypted extensions or any other appendixes that are used for locking up data. Also, the cyber threat does not touch files and documents in the following locations: