Lab 2.2 Port Scanning 2 - Oliver-Mustoe/Oliver-Mustoe-Tech-Journal GitHub Wiki

In this lab, we learned about port scanning with nmap

Notes

I ran several nmap commands for port scanning on a Windows host. These specific flags and examples of commands can be found HERE.

I also learned how to change a local user password for Windows with the command prompt command:
net user USERNAME NEWPASS

I also ALSO learned how to enable Remote Desktop for Windows with the powershell command:

  • Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -name "fDenyTSConnections" -value 0

And then enable it to go through the firewall with the command:

  • Enable-NetFirewallRule -DisplayGroup "Remote Desktop"

Reflection:

Nmap is a powerful tool that I am still scraping the surface with. I need to remember that ports can be ranged, with "{lowerport}-{higherport}", and that they should immediately come after the -p.
I also need to remember to keep updating my dedicated page for nmap commands and flags, found HERE.

Sources: