Lab 2.2 - Zacham17/my-tech-journal GitHub Wiki

Lab 2.2 Port Scanning 2

Testing Windows 10 VM and Kali VM Connectivity with Ping and Nmap

Ping

  • Using the ping command, I was able to ping my Kali VM from my windows 10 workstation, but was unable to successfully ping my Windows 10 VM from my Kali VM. This is because, by default, windows doesn't allow incoming ICMP connections/requests

Nmap

  • From my Kali VM, I ran wireshark, and ran the command sudo nmap -p 9999 10.0.17.140, which resulted in some ARP packets showing in wireshark.

Remote Desktop from Kali to Windows

  • Allow remote desktop connections on windows through the settings
  • Install Remmina in the Kali VM.
    • Remmina can be installed using sudo apt-get -y install remmina
  • Once the above have been completed, you can open remmina on the Kali VM and use the Windows host's IP address to remotely connect to it

Network and Sharing Settings on Windows 10

  • I ran the command nmap -p 1-6000 10.0.17.140 to scan ports 1-6000 on my windows system and it showed port 3389 to be open
  • In the Advanced settings of the Network and Sharing Center, enable Network Discovery and Turn on File and Printer Sharing.
  • I ran nmap -p 1-6000 10.0.17.140 and ports 139, 135, and 445 are now shown to be open

More nmap

  • I ran an nmap scan on the open ports on Windows 10 using the command, nmap -p 139,135,445,3389 10.0.17.140 to retrieve the service version running on each port
  • I then ran the command, nmap -A -O -sV --traceroute -p 139,135,445,3389 10.0.17.140 to do a more intense scan on my Windows host

Reflection

  • This lab was pretty straight forward, and I didn't have any issues. I did learn more about the functionality of nmap and the use of Reminna