Главная
Study mode:
on
1
Intro
2
Why this talk?
3
SMB/CIFS History
4
Bad Defaults
5
You, Me & EVERYONE We Know
6
$ Is Not Really Hidden
7
Outside Of A Windows Domain?
8
Getting Accounts
9
Windows Credential Editor
10
Metasploit
11
Nmap Output
12
SoftPerfect Network Scanner
13
Basic Tweak
14
Windows Search
15
Wireless/Host Isolation
16
Disabling Admin Network Logon
17
LMCompatibilityLevel
Description:
Explore techniques for identifying and exploiting file share vulnerabilities in a comprehensive conference talk. Delve into SMB/CIFS history, common misconfigurations, and methods for discovering exposed network resources. Learn about tools like Windows Credential Editor, Metasploit, and Nmap for privilege escalation and network enumeration. Discover practical strategies to secure file shares, including tweaking Windows settings, implementing proper network isolation, and adjusting LM compatibility levels. Gain valuable insights into the risks associated with default configurations and hidden shares, equipping yourself with the knowledge to better protect network resources.

Check Your Privileges - Futzing with File Shares for Low Hanging Fruit

Add to list
0:00 / 0:00