January 2020
Intermediate to advanced
368 pages
9h 46m
English

In the previous chapters, you examined various common protocols used for network communication, including raw TCP, HTTP, and DNS. Each of these protocols has interesting use cases for attackers. Although an extensive number of other network protocols exist, we’ll conclude our discussion of network protocols by examining Server Message Block (SMB), a protocol that arguably proves to be the most useful during Windows post-exploitation.
SMB is perhaps the most complicated protocol you’ll see in this book. It has a variety of uses, but SMB is commonly used for sharing resources such as files, printers, and serial ports ...