A rdp session password can be requested and will then be delivered as part of the encrypted xml communication - the complicated part is the extra security, even a valid password is not enough to log in, "someone" has already tried this *cough*.
I haven't look into xml rdp request yet, however from my past experience with windows server terminal services, i'm guessing there two types of RDP authentication here, the first is the standard windows login username/password, witch, by the facts that i already described, it must be a fixed/per provider/per box username/combination, after the windows login session is established, then terminal services in single-application mode(i don't expect they were dumb enough to give a full windows interactive session) delivers to the box the iptv-specific application, and that application authentication can be a session based one delivered via xml... but that has nothing to do with RDP auth... I am talking about RDP/Windows server stdandard auth.... Of course if you pass the first authentication(the windows one) that is useless without passing the second... but it's a start...
A wireshark dissector is rather useless, because like I already said, the key is inside the rsa encrypted first server response, and it's different each time.
I know it's different every session, that's why i said that when tv2 decrypts the first rsa sent by the server, the key could be written to some field in the UI by a modified tv2... So if anyone want to sniff something in the xml,then it would be possible to do "live sniffing" with wireshark instead of relying on a modified tv2client to dump xml files to hard disk...(of course the first step will be to get the key from that field in the UI and insert it on Wireshark, on every capture session, since the key changes in every session)
Or tv2client doesn't even have access to key, and the decryption in done inside the XPU??