Week 2 OLD - nicolas-tullio/Tech-Journal GitHub Wiki
Lab 2.2 - Port Scanning 2
NMAP
The p
flag is used to specify what port to scan for.
sudo nmap 10.0.17.106 -p 3389
Remmina
This is a RDP application for kali. Enter the following command to install it.
sudo apt-get install remmina
After run the remmina application. Enter the ip address of the windows machine.
More NMAP
The first nmap scan for version detection using the V flag, below is the command used to find info about the version of the system. Also notice the s flag, that means verbose and provides more information overall. Here is that command:
sudo nmap 10.0.17.106 -sV -p 3389
Next the A flag is used to try and gain even more information about the host. This flag also runs a traceroute on the host as well.
sudo nmap 10.0.17.106 -A -p 3389
Next, scan ports 1 through 6000 with the following command:
sudo nmap -p 1-6000 -sT 10.0.17.106
Next on the Windows machine, I turned on file and printer sharing which opened up more ports on the Windows machine. When I ran the previous command, the scan found more ports were open. I then did a version scan only on the ports that were previously found in the command below:
sudo nmap -p 135,139,445,3389 -sT 10.0.17.106
Finally, in the last scan, the A flag is again used against the exposed ports.
sudo nmap -p 135,139,445,3389 -sT -A --traceroute 10.0.17.106
Reflection
This lab seemed pretty straightforward although it was my first encounter with Remmina. It was interesting to see how much information can be pulled by nmap.