--nla-screenshot flag. Each screenshot is then processed with OCR (pytesseract/Tesseract) to extract visible text — useful for identifying login banners, computer names, domain membership, and running applications.
Navigate to NETWORK → RDP Screenshots in the sidebar.
How it works
Scan targets
netexec runs
nxc rdp <targets> --nla-screenshot against all provided targets. Each host that responds on RDP is screenshotted before authentication — capturing the NLA (Network Level Authentication) pre-login screen.OCR text extraction
Each PNG screenshot is processed with pytesseract (Tesseract OCR engine) to extract readable text. The extracted text is stored alongside the screenshot in the results JSON.
Requirements
RDP Screenshots requires two additional Python packages installed bysetup.sh:
| Package | Purpose |
|---|---|
pillow | Image processing library (PIL) required by pytesseract |
pytesseract | Python wrapper for Tesseract OCR |
tesseract-ocr and tesseract-ocr-eng are installed by setup.sh via apt.
API endpoints
POST /api/rdpscreenshot/run
Launches an RDP screenshot scan against a list of targets. Any currently running RDP scan is automatically cancelled before the new scan starts.| Field | Type | Description |
|---|---|---|
targets | array of strings | IP addresses, hostnames, or CIDR ranges to scan |
GET /api/rdpscreenshot/status
Poll the progress of a running RDP scan.status is one of running, completed, cancelled, or error.
GET /api/rdpscreenshot/latest
Retrieve the results from the most recently completed RDP screenshot scan.{"status": "none"} if no completed scan exists.
Output files
| File | Contents |
|---|---|
recon/rdpscreenshot_<scan_id>.json | Full results with OCR text for all targets |
recon/rdpscreenshot_<scan_id>.txt | Raw netexec output log |
recon/screenshots/rdp_<ip>.png | Individual RDP pre-login screenshots |
Workflow
Identify RDP hosts
Run an Nmap scan with the infra port preset, which includes port 3389. Alternatively, run Masscan against port 3389. Discovered hosts appear in DATA → Hosts.
Run RDP Screenshots
Open NETWORK → RDP Screenshots. Enter target IPs or pull from your scope. Click Start Scan.
Review the gallery
Once the scan completes, screenshots appear in a gallery. The OCR text overlay shows extracted text from each pre-login screen.
RDP Screenshots capture the pre-authentication NLA screen. No credentials are required or submitted. The tool is read-only and does not attempt to authenticate to RDP.