top of page

RECONNAISSANCE & SCANNING

Network Reconnaissance
Screenshot (745).png

We will make use of the “-sn” feature in Nmap which allows us to scan for all alive hosts on the victim subnet and gives us an idea of what targets we can target.

Port Scanning
Screenshot (746).png

IP Address of Victim Server

Before we begin with our exploitation steps, we would have to perform a port scan on our target via Nmap to uncover the open port on the victim's machine to ensure it is opened to perform the exploitation.

Based on our Nmap scan, we are able to uncover that port 3389 (RDP) is opened, hence this suggests that we are able to exploit the victim using BlueKeep vulnerabilities

Screenshot (747).png

IP Address of Victim Server

For us to indeed confirm that port 3389 is open for us to perform our BlueKeep exploit, we performed an individual IP Address Nmap scan on our yet to be victim machine

Best viewed in Chrome browser settings

©️ 2020 School of InfoComm Technology, Ngee Ann Polytechnic. All rights reserved.

bottom of page