Watch this video on YouTube
What tool can be used to exploit a known vulnerability in Windows Server Remote Desktop Protocol (RDP)?