@@ -15,20 +15,20 @@ rem KIND, either express or implied. See the License for the
15
15
rem specific language governing permissions and limitations
16
16
rem under the License.
17
17
18
- rem
18
+ rem
19
19
rem Configure and start RDP service.
20
20
rem Configure RPD service to use custom key instead of autogenerated for Wireshark and Network Monitor Decrypt Expert.
21
21
rem rdp.pfx is necessary because it fingerprints are hardcoded in this script.
22
- rem
22
+ rem
23
23
24
24
rem Turn off firewall
25
25
26
26
netsh advfirewall firewall set rule group = " Remote Desktop" new enable=yes
27
27
28
28
rem Enable TS connections
29
- rem
29
+ rem
30
30
rem Windows Registry Editor Version 5.00
31
- rem
31
+ rem
32
32
rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server]
33
33
rem "AllowTSConnections"=dword:00000001
34
34
rem "fDenyTSConnections"=dword:00000000
@@ -57,7 +57,7 @@ certutil -p test -importPFX "Remote Desktop" rdp.pfx
57
57
rem Configure RDP server to use certificate:
58
58
59
59
rem Windows Registry Editor Version 5.00
60
- rem
60
+ rem
61
61
rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp]
62
62
rem "SSLCertificateSHA1Hash"=hex:c1,70,84,70,bc,56,42,0a,bb,f4,35,35,ba,a6,09,b0,4e,98,4a,47
63
63
reg add " HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v " SSLCertificateSHA1Hash" /t REG_HEX /d " " /f
@@ -73,13 +73,13 @@ rem certutil -store -v My
73
73
certutil -store -v " Remote Desktop"
74
74
75
75
rem Disable TLS 1.1 (for Network Monitor Decrypt Expert)
76
- rem
76
+ rem
77
77
rem Windows Registry Editor Version 5.00
78
- rem
78
+ rem
79
79
rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client]
80
80
rem "Enabled"=dword:00000000
81
81
rem "DisabledByDefault"=dword:00000001
82
- rem
82
+ rem
83
83
rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server]
84
84
rem "Enabled"=dword:00000000
85
85
rem "DisabledByDefault"=dword:00000001
@@ -91,13 +91,13 @@ reg add "HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protoc
91
91
92
92
93
93
rem Disable TLS 1.2 (for Network Monitor Decrypt Expert)
94
- rem
94
+ rem
95
95
rem Windows Registry Editor Version 5.00
96
- rem
96
+ rem
97
97
rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client]
98
98
rem "Enabled"=dword:00000000
99
99
rem "DisabledByDefault"=dword:00000001
100
- rem
100
+ rem
101
101
rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server]
102
102
rem "Enabled"=dword:00000000
103
103
rem "DisabledByDefault"=dword:00000001
@@ -135,4 +135,4 @@ rem dism /online /enable-feature /featurename:NetFx3
135
135
rem PS.
136
136
rem Don't forget to set Windows profile as active in Network Monitor, so SSL traffic branch will appear under
137
137
rem svnchost.exe, so you will be able to decrypt it (don't forget to save and reopen captured traffic to file first).
138
- rem
138
+ rem
0 commit comments