Home > Products > Windows Passwords > Reset Windows Password > Screenshots > Remote Desktop > Remote Desktop credentials
Analyze and decrypt Remote Desktop connections and passwords
11.06.2024
OneNote password recovery v3.4
Support for Microsoft Office 365
17.04.2024
Reset Windows Password v14.2
Telegram data recovery, Photo Database and Media Player investigation tools, and some more
12.04.2024
Office password recovery tools
Resetting VBA passwords
01.03.2024
New blog post
Dumping the history of users' IP addresses in Windows

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Reset Windows Password: Remote Desktop credentials


When a user connects to a remote computer via Remote Desktop Protocol, the credentials of the remote computer are cached locally (assuming the user has selected the appropriate option) to allow for automatic authentication during subsequent connections.

The cached credentials are stored in the Windows Credential Manager, which is a secure storage area for usernames, passwords, and other authentication information, enabling the user to connect to the remote computer later without having to enter their username and password.

The program can enumerate, extract, and decrypt the RDP credentials stored in the Windows Credential Manager in just two simple steps.

 

Selecting user account

Remote Desktop user account

Firstly, input the Windows directory and the user account to be scanned for saved RDP credentials.

 

Remote Desktop connections and passwords

Remote Desktop passwords

If required, provide the account logon password. The program will output all decrypted RDP credentials, along with the address of the remote computer, date connected, and other relevant information.

 
If you need to decrypt other passwords stored in the Windows Credential Manager, switch to the network password recovery tool.