Check Your Privileges - Futzing with File Shares for Low Hanging Fruit
Offered By: YouTube
Course Description
Overview
Explore techniques for identifying and exploiting file share vulnerabilities in a comprehensive conference talk. Delve into SMB/CIFS history, common misconfigurations, and methods for discovering exposed network resources. Learn about tools like Windows Credential Editor, Metasploit, and Nmap for privilege escalation and network enumeration. Discover practical strategies to secure file shares, including tweaking Windows settings, implementing proper network isolation, and adjusting LM compatibility levels. Gain valuable insights into the risks associated with default configurations and hidden shares, equipping yourself with the knowledge to better protect network resources.
Syllabus
Intro
Why this talk?
SMB/CIFS History
Bad Defaults
You, Me & EVERYONE We Know
$ Is Not Really Hidden
Outside Of A Windows Domain?
Getting Accounts
Windows Credential Editor
Metasploit
Nmap Output
SoftPerfect Network Scanner
Basic Tweak
Windows Search
Wireless/Host Isolation
Disabling Admin Network Logon
LMCompatibilityLevel
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network