6INTERACTING WITH SMB AND NTLM
In the previous chapters, you examined various common protocols used for network communication, including raw TCP, HTTP, and DNS. Each of these protocols has interesting use cases for attackers. Although an extensive number of other network protocols exist, we’ll conclude our discussion of network protocols by examining Server Message Block (SMB), a protocol that arguably proves to be the most useful during Windows post-exploitation.
SMB is perhaps the most complicated protocol you’ll see in this book. It has a variety of uses, but SMB is commonly used for sharing resources such as files, printers, and serial ports ...
Get Black Hat Go now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.