Home > Products > Windows Passwords > Reset Windows Password > Screenshots > Remote Desktop > Remote Desktop credentials
Analyze and decrypt Remote Desktop connections and passwords
20.02.2024
Reset Windows Password v14.1
IP addresses history viewer, fast disk search, local security editor and some more
02.01.2024
Wireless Password Recovery v6.9.0
A revision of the GPU health monitor along with some minor updates
23.12.2023
HAPPY NEW YEAR!
Happy New Year greetings and holidays discount
12.12.2023
Reset Windows Password v14.0
New advanced disk utilities

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Reset Windows Password: Remote Desktop credentials


When a user connects to a remote computer via Remote Desktop Protocol, the credentials of the remote computer are cached locally (assuming the user has selected the appropriate option) to allow for automatic authentication during subsequent connections.

The cached credentials are stored in the Windows Credential Manager, which is a secure storage area for usernames, passwords, and other authentication information, enabling the user to connect to the remote computer later without having to enter their username and password.

The program can enumerate, extract, and decrypt the RDP credentials stored in the Windows Credential Manager in just two simple steps.

 

Selecting user account

Remote Desktop user account

Firstly, input the Windows directory and the user account to be scanned for saved RDP credentials.

 

Remote Desktop connections and passwords

Remote Desktop passwords

If required, provide the account logon password. The program will output all decrypted RDP credentials, along with the address of the remote computer, date connected, and other relevant information.

 
If you need to decrypt other passwords stored in the Windows Credential Manager, switch to the network password recovery tool.