NMAP Tutorial - How to Find Windows Servers with RDP Enabled [Kali Linux]

Subscribers:
6,530
Published on ● Video Link: https://www.youtube.com/watch?v=gP9_F92vYMY



Category:
Tutorial
Duration: 1:02
4,483 views
11


In this tutorial we use NMAP to run a port scan to check to see if port 3389 is open. Port 3389 is the default port for Remote Desktop Protocol (RDP).

* Scripts: https://pastebin.com/u/otown . .
=== Remote IT Support ===
https://linktr.ee/remotetechsupport

=== Music ===
https://linktr.ee/nichproductions

=== Beautiful World ===
https://linktr.ee/beautifulworldtravel




Other Videos By Remote IT Support


2017-02-22Linux Tutorial - FTP Client Utility [Kali Linux]
2017-02-22NMAP Tutorial - FTP Bruteforce NSE Script [Kali Linux]
2017-02-22NMAP Tutorial - FTP Port Scan (Port 21) [Kali Linux]
2017-02-22Hydra - SSH Bruteforce [Kali Linux]
2017-02-22NMAP Tutorial - SSH Port Scan [Kali Linux]
2017-02-22NMAP Tutorial - Telnet Bruteforce NSE Script [Kali Linux]
2017-02-22NMAP Tutorial - Telnet Port Scan (Port 23) [Kali Linux]
2017-02-22Linux Tutorial - How to use GunZip to Extract a Compressed .gz File. [Kali Linux]
2017-02-22NMAP Tutorial - RDP Remote Code Execution (MS12-20) Vulnerability [Kali Linux]
2017-02-22rdesktop - Linux Utility to RDP into a Remote Windows Server [Kali Linux]
2017-02-22NMAP Tutorial - How to Find Windows Servers with RDP Enabled [Kali Linux]
2017-02-22MySQLDump - Download All Databases of a Remote MySQL Server [Kali Linux]
2017-02-22NMAP Tutorial - MySQL Brute Force NSE Script [Kali Linux]
2017-02-22NMAP Tutorial - How to Scan for MySQL Servers [Kali Linux]
2017-02-21jSQL - SQL Injection [Kali Linux]
2017-02-21searchsploit – Utility to Search the Exploit Database Archive [Kali Linux]
2017-02-21RTPFlood - Spoofed RTP Flood DoS Attack (Port 5060) [Kali Linux]
2017-02-21DHCPig (pig.py) - DHCP Exhaustion Attack [Kali Linux]
2017-02-21Smurf6 - IPv6 Smurf Attack [Kali Linux]
2017-02-21rsmurf6 – Smurf Attack a Target Completely Flooding the LAN / IPv6 Exploit [Kali Linux]
2017-02-21redir6 – Implant a Route into Victim-IP / IPv6 Exploit [Kali Linux]



Tags:
NMAP
RDP
Windows Server
Windows
Remote Desktop Protocol
Port Scan
Port 3389
3389
Kali
Kali Linux
Linux