@@ -15,20 +15,20 @@ rem KIND, either express or implied. See the License for the
1515rem specific language governing permissions and limitations
1616rem under the License.
1717
18- rem
18+ rem
1919rem Configure and start RDP service.
2020rem Configure RPD service to use custom key instead of autogenerated for Wireshark and Network Monitor Decrypt Expert.
2121rem rdp.pfx is necessary because it fingerprints are hardcoded in this script.
22- rem
22+ rem
2323
2424rem Turn off firewall
2525
2626netsh advfirewall firewall set rule group = " Remote Desktop" new enable=yes
2727
2828rem Enable TS connections
29- rem
29+ rem
3030rem Windows Registry Editor Version 5.00
31- rem
31+ rem
3232rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server]
3333rem "AllowTSConnections"=dword:00000001
3434rem "fDenyTSConnections"=dword:00000000
@@ -57,7 +57,7 @@ certutil -p test -importPFX "Remote Desktop" rdp.pfx
5757rem Configure RDP server to use certificate:
5858
5959rem Windows Registry Editor Version 5.00
60- rem
60+ rem
6161rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp]
6262rem "SSLCertificateSHA1Hash"=hex:c1,70,84,70,bc,56,42,0a,bb,f4,35,35,ba,a6,09,b0,4e,98,4a,47
6363reg add " HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v " SSLCertificateSHA1Hash" /t REG_HEX /d " " /f
@@ -73,13 +73,13 @@ rem certutil -store -v My
7373certutil -store -v " Remote Desktop"
7474
7575rem Disable TLS 1.1 (for Network Monitor Decrypt Expert)
76- rem
76+ rem
7777rem Windows Registry Editor Version 5.00
78- rem
78+ rem
7979rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Client]
8080rem "Enabled"=dword:00000000
8181rem "DisabledByDefault"=dword:00000001
82- rem
82+ rem
8383rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.1\Server]
8484rem "Enabled"=dword:00000000
8585rem "DisabledByDefault"=dword:00000001
@@ -91,13 +91,13 @@ reg add "HKLM\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protoc
9191
9292
9393rem Disable TLS 1.2 (for Network Monitor Decrypt Expert)
94- rem
94+ rem
9595rem Windows Registry Editor Version 5.00
96- rem
96+ rem
9797rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client]
9898rem "Enabled"=dword:00000000
9999rem "DisabledByDefault"=dword:00000001
100- rem
100+ rem
101101rem [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Server]
102102rem "Enabled"=dword:00000000
103103rem "DisabledByDefault"=dword:00000001
@@ -135,4 +135,4 @@ rem dism /online /enable-feature /featurename:NetFx3
135135rem PS.
136136rem Don't forget to set Windows profile as active in Network Monitor, so SSL traffic branch will appear under
137137rem svnchost.exe, so you will be able to decrypt it (don't forget to save and reopen captured traffic to file first).
138- rem
138+ rem
0 commit comments