YoVDO

Check Your Privileges - Futzing with File Shares for Low Hanging Fruit

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Network Security Courses Ethical Hacking Courses Metasploit Courses Nmap Courses Wireless Security Courses Windows Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore techniques for identifying and exploiting file share vulnerabilities in a comprehensive conference talk. Delve into SMB/CIFS history, common misconfigurations, and methods for discovering exposed network resources. Learn about tools like Windows Credential Editor, Metasploit, and Nmap for privilege escalation and network enumeration. Discover practical strategies to secure file shares, including tweaking Windows settings, implementing proper network isolation, and adjusting LM compatibility levels. Gain valuable insights into the risks associated with default configurations and hidden shares, equipping yourself with the knowledge to better protect network resources.

Syllabus

Intro
Why this talk?
SMB/CIFS History
Bad Defaults
You, Me & EVERYONE We Know
$ Is Not Really Hidden
Outside Of A Windows Domain?
Getting Accounts
Windows Credential Editor
Metasploit
Nmap Output
SoftPerfect Network Scanner
Basic Tweak
Windows Search
Wireless/Host Isolation
Disabling Admin Network Logon
LMCompatibilityLevel


Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity