Home > Products > Windows Passwords > Reset Windows Password > Screenshots > Remote Desktop > Remote Desktop credentials
Analyze and decrypt Remote Desktop connections and passwords
Windows Password Recovery v15.3.0
Windows Credentials Explorer
Reset Windows Password v13.1
Forensic tools to analyze Remote Desktop activity in Windows
Wireless Password Recovery v6.8.1
New templates to seach for default passwords of some broadband WiFi routers
Reset Windows Password v13.0
Full support for Windows 11, duplicate file finder, checksum calculator and some new tools

Articles and video

You may find it helpful to read our articles on Windows security and password recovery examples. Video section contains a number of movies about our programs in action

Reset Windows Password: Remote Desktop credentials

When a user connects to a remote computer via Remote Desktop Protocol, the credentials of the remote computer are cached locally (assuming the user has selected the appropriate option) to allow for automatic authentication during subsequent connections.

The cached credentials are stored in the Windows Credential Manager, which is a secure storage area for usernames, passwords, and other authentication information, enabling the user to connect to the remote computer later without having to enter their username and password.

The program can enumerate, extract, and decrypt the RDP credentials stored in the Windows Credential Manager in just two simple steps.


Selecting user account

Remote Desktop user account

Firstly, input the Windows directory and the user account to be scanned for saved RDP credentials.


Remote Desktop connections and passwords

Remote Desktop passwords

If required, provide the account logon password. The program will output all decrypted RDP credentials, along with the address of the remote computer, date connected, and other relevant information.

If you need to decrypt other passwords stored in the Windows Credential Manager, switch to the network password recovery tool.