Analyze the command below:
C: Documents and Settings Administrator> reg add HKLM SYSTEM CurrentControlSet Services SharedAccess Parameters FirewallPolicy StandardProfile GloballyOpenPorts List /V 2000:TCP /T REG_SZ /F /D "2000:TCP:*:Enabled"
How can this command be used by a penetration tester?
1) Allow an incoming connection to an application
2) Permit inbound traffic to TCP ports lower than 2000
3) Run the netcat process with Administrative permission
4) Log failed connection attempts to 2000/tcp for analysis