Lab 2.2 Port Scanning 2 - Oliver-Mustoe/Oliver-Mustoe-Tech-Journal GitHub Wiki
In this lab, we learned about port scanning with nmap
Notes
I ran several nmap commands for port scanning on a Windows host. These specific flags and examples of commands can be found HERE.
I also learned how to change a local user password for Windows with the command prompt command:
net user USERNAME NEWPASS
I also ALSO learned how to enable Remote Desktop for Windows with the powershell command:
Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -name "fDenyTSConnections" -value 0
And then enable it to go through the firewall with the command:
Enable-NetFirewallRule -DisplayGroup "Remote Desktop"
Reflection:
Nmap is a powerful tool that I am still scraping the surface with. I need to remember that ports can be ranged, with "{lowerport}-{higherport}", and that they should immediately come after the -p.
I also need to remember to keep updating my dedicated page for nmap commands and flags, found HERE.