May 2017
Intermediate to advanced
416 pages
21h 33m
English
SMB, unarguably the most important protocol of Windows-based hosts, supports message signing to help hosts confirm the origin and authenticity of the data transmitted. Unfortunately, this is disabled by default for all systems except domain controllers. This makes Windows hosts susceptible to Man in the Middle (MitM) attacks that can lead to remote code execution through SMB poisoning/relaying.
This recipe shows how to obtain the SMB signing configuration of Windows machines with Nmap.
Read now
Unlock full access