SEC-335: Eth. Hacking & Pen. Testing
HomeTech JournalsPersonal ProjectsSysadmin Wiki
  • SEC-335: Eth. Hacking & Pen. Testing
  • Breakdown
    • Course Overview
  • Activities/Assignments
    • Assignment 1.2: The Kali Virtual Machine
    • Activity 2.1: Host Discovery
    • Activity 3.1: DNS Enumeration
    • Activity 4.1: Exploiting Cupcake
    • Assignment 5.1: Breaking into Kali
  • Labs
    • Lab 2.1: Port Scanning 1
    • Lab 2.2: Port Scanning 2
    • Lab 3.1: Powershell and DNS
    • Lab 3.2: DNS uses TCP and UDP
    • Lab 5.1: Password Guessing
    • Lab 6.1: Cracking Linux Passwords with JtR and Hashcat
    • Lab 7.1: Exploiting pippin.shire.org (10.0.5.25)
    • Lab 8.1: Weevely
    • Lab 8.2: Reverse Shell
    • Lab 9.1: Exploit Gloin
    • Lab 10.1: Linux - Permission Vulnerabilities
    • Lab 10.2: Exploiting nancurunir
    • Lab 11.1: Metasploit
    • Final: Bree
  • Tools/Recon
    • Metasploit
    • NMAP
    • Active/Passive Reconnaissance
    • Shodan
    • The Harvester
    • Netcraft
    • Metagoofil
    • DNS-Enumeration
    • CEWL
    • rsmangler
    • Hydra
    • DIRB
    • John the Ripper
    • Hashcat
    • Passwords
    • TMP
Powered by GitBook
On this page
  • Summary:
  • Deliverable 1. Observe and repeat the following interaction between kali and your win10 system (substitute your IP addresses). Provide screenshot(s) similar to the one below that show:
  • Deliverable 2. Figure out how to enable Remote Desktop Services on your windows 10 system using powershell or the command prompt and conduct an nmap scan against the rdp tcp port from your kali system.
  • Deliverable 3. On Kali, make sure remmina is installed and figure out how to initiate an RDP session to your windows box. Provide a screenshot similar to the one below.
  • Deliverable 5. Replace -sV with -A to attempt to derive more information on the host and exposed service. Provide a screenshot similar to the one below. You will notice that the rdp-ntlm-info script provides a good deal of information (1) and that the OS detection output is not very accurate at all.
  • Deliverable 6. Run an nmap scan against your windows 10 system. Only target tcp ports 1-6000. Provide a screenshot showing your command and output.
  • Deliverable 7, Rescan ports 1-6000. Provide a screenshot similar to the one below that shows your command and results. You will note that 3 new ports have been exposed.
  • Deliverable 8. Figure out how to run a version scan against only the ports exposed above. Provide a screenshot showing your nmap command and the output similar to the one below.
  • Deliverable 9. Increase the output by running OS Detection, Version Detection, Script Scanning and traceroute against your windows 10 target. Provide a screenshot showing your command and output similar to the one below. You will notice we have smb and netbios related information.
  1. Labs

Lab 2.2: Port Scanning 2

PreviousLab 2.1: Port Scanning 1NextLab 3.1: Powershell and DNS

Last updated 2 years ago

Summary:

During this lab we worked more with nmap and port scanning. This time we used nmap against our windows machines and their rdp ports (3389). This lab was relativly straight forward I didn't run into any big issues except for the terminal in kali being strange.

Edit: I went back to fix an error in 9 and figured out I had used a hot key to remove the border of the terminal...

Deliverable 1. Observe and repeat the following interaction between kali and your win10 system (substitute your IP addresses). Provide screenshot(s) similar to the one below that show:

Deliverable 2. Figure out how to enable Remote Desktop Services on your windows 10 system using powershell or the command prompt and conduct an nmap scan against the rdp tcp port from your kali system.

nmap command:

sudo nmap 10.0.17.23 -p 3389

Deliverable 3. On Kali, make sure remmina is installed and figure out how to initiate an RDP session to your windows box. Provide a screenshot similar to the one below.

sudo apt install remmina

Deliverable 4. Add the -sV flag to your previous nmap scan against rdp on windows 10 and provide a screenshot similar to the one below (include your nmap command). You will note a bit more verbiage than seen without the flag.

nmap command:

sudo nmap 10.0.17.23 -p 3389 -sV

Deliverable 5. Replace -sV with -A to attempt to derive more information on the host and exposed service. Provide a screenshot similar to the one below. You will notice that the rdp-ntlm-info script provides a good deal of information (1) and that the OS detection output is not very accurate at all.

nmap command:

sudo nmap 10.0.17.23 -p 3389 -A

Deliverable 6. Run an nmap scan against your windows 10 system. Only target tcp ports 1-6000. Provide a screenshot showing your command and output.

nmap command:

sudo nmap 10.0.17.23 -p T:1-6000

Deliverable 7, Rescan ports 1-6000. Provide a screenshot similar to the one below that shows your command and results. You will note that 3 new ports have been exposed.

nmap command:

sudo nmap 10.0.17.23 -p T:1-6000

Deliverable 8. Figure out how to run a version scan against only the ports exposed above. Provide a screenshot showing your nmap command and the output similar to the one below.

nmap command:

sudo nmap 10.0.17.23 -p T:1-6000 -sV

Deliverable 9. Increase the output by running OS Detection, Version Detection, Script Scanning and traceroute against your windows 10 target. Provide a screenshot showing your command and output similar to the one below. You will notice we have smb and netbios related information.

nmap command:

sudo nmap 10.0.17.23 -p T:1-6000 -A