Lab 2.2 - Adam-Hachem/SEC335 GitHub Wiki
Reflection
In this lab, we learned a lot about nmap. We opened ports by turning on services in Windows, then ran port scans to see the changes from an attacker on the network's perspective. I charted everything the lab covers on nmap here, and I will be updating it as I do more with the tool. We also used remmina to exploit RDP once we enabled it with Powershell like this:
Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server'-name "fDenyTSConnections" -Value 0
Enable-NetFirewallRule -DisplayGroup "Remote Desktop"