How to connect kali linux remotely from Windows using xrdp

 How to connect kali linux remotely from Windows using xrdp

 XRDP (X Remote Desktop Protocol) is an open-source remote desktop protocol that enables users to connect to a remote desktop environment from a different computer. It allows for remote access to Linux desktop environments from Windows systems.

The default RDP port on Windows is 3389, which is used for Microsoft terminal server. However, changing the RDP port can be helpful when network-level authentication (NLA) is turned off or firewalls are configured to block incoming and outgoing communication to and from port 3389 to prevent hackers from accessing it.

STEPS TO BE FOLLOWED:

step 1:

update the linux using the command

  • sudo apt-get update

step 2:

install xrdp package as it available in apt package using the command

  • sudo apt install xrdp

step 3:

after installing we need to run some services using the following commands

  • sudo service xrdp start
  • sudo service xrdp-sesman start
  • sudo update-rc.d xrdp enable

step 4:

after all services are turned on to check the status

  • sudo service xrdp status

step 5:

in windows search for remote Desktop Connection



step 6:

After that type the ip address of the kali machine



step 7:

enter the username and password



step 8:

enter the username and password to connect



step 9:

the device is ready to work



The problems I faced

while connecting to rdp client in windows it shows much error like as i mentioned the screenshot below



to resolve this i changed the network adapter to bridged adapter so that i can able to connect



Comments

Popular posts from this blog

FOUNDATIONS OF CYBERSECURITY GOOGLE(COURSERA) QUIZ ANSWERS

HOW TO BYPASS THE 2FA(TWO FACTOR AUTHENTICATION)

PlayItSafe google cyber security professional course 2 (COURSERA)

BITFLIPING

AUTOMATED SCRIPT FOR FINDING XSS

BEGINNER BUG BOUNTY TOOLS PART-1

The article explores the technique of remote server control through reverse shells employed by hackers, emphasizing their ability to gain unauthorized access and control over servers.

Things should do after sublister(sublist3r)

BEGINNER BUG BOUNTY TOOLS PART 2

how hackers do a phishing page in 8 lines of code using html