π© This is the public repository of aardwolf, for latest version and updates please consider supporting us through https://porchetta.industries/
AARDWOLF - Asynchronous RDP/VNC client in Python (headless)
This project is aimed to play around the RDP and VNC protocols.
Project contains no GUI, for a GUI client please check out aardwolfgui
π© Sponsors
If you want to sponsors this project and have the latest updates on this project, latest issues fixed, latest features, please support us on https://porchetta.industries/
Official Discord Channel
Come hang out on Discord!
Important
This is a headless client, for GUI functionality use the aardwolfgui
package.
Features
- Supports credssp auth via NTLM/Kerberos.
- Built-in proxy client allows SOCKS/HTTP proxy tunneling without 3rd part software
- PtH via CredSSP+Restricted admin mode
- Scriptable Keyboard, Mouse input and Clipboard input/output
- Can run in headless mode, no GUI required (read: no need for Qt)
- Support for Duckyscript files to emulate keystrokes
Example scripts
ardpscan
Multi-purpose scanner for RDP and VNC protocols. (screenshot/capabilities/login scanner)
URL format
As usual the scripts take the target/scredentials in URL format. Below some examples
rdp+kerberos-password://TEST\Administrator:[email protected]/?dc=10.10.10.2&proxytype=socks5&proxyhost=127.0.0.1&proxyport=1080
CredSSP (akaHYBRID
) auth using Kerberos auth + password viasocks5
towin2016ad.test.corp
, the domain controller (kerberos service) is at10.10.10.2
. The socks proxy is on127.0.0.1:1080
rdp+ntlm-password://TEST\Administrator:[email protected]
CredSSP (akaHYBRID
) auth using NTLM auth + password connecting to RDP server10.10.10.103
rdp+ntlm-password://TEST\Administrator:<NThash>@10.10.10.103
CredSSP (akaHYBRID
) auth using Pass-the-Hash (NTLM) auth connecting to RDP server10.10.10.103
rdp+plain://Administrator:[email protected]
Plain authentication (No SSL, encryption is RC4) using password connecting to RDP server10.10.10.103
vnc+plain://[email protected]
VNC client with VNC authentication using password connecting to RDP server10.10.10.103
vnc+plain://[email protected]
VNC client with VNC authentication using password connecting to RDP server10.10.10.103
vnc+plain://:admin:[email protected]
VNC client with VNC authentication using passwordadmin:aa
connecting to RDP server10.10.10.103
. Note that if the password contains:
char you will have to prepend the password with:
Kudos
- Sylvain Peyrefitte (@citronneur)
rdpy
. The decompression code and the QT image magic was really valuable. - Marc-AndrΓ© Moreau (@awakecoding) for providing suggestions on fixes