New Training: Exploits and Payloads
In this 6-video skill, CBT Nuggets trainer Bob Salmans explains exploits and payloads as well as file transfers between pentesters and their targets. Watch this new CompTIA training.
Learn CompTIA with one of these courses:
This training includes:
- 6 videos
- 56 minutes of training
You’ll learn these topics in this skill:
- Exploits and Payloads
- Moving Files With PwnDrop
- Transferring Files with SMB and SCP
- Working With Exploits
- Working With Payloads
- Exploits and Payloads Review
SMB or SCP: Which Transfer Protocol Should You Use
Sending files within an organization is a critical component of every organization. Whether it’s sending files within a network, interfacing with clients, or sending files around the world, organizations are required to transfer data seamlessly and securely at the scale and requirements of today's modern business. Fortunately, organizations have access to many different transfer protocols that provide unique benefits depending on the use case. Two of the primary transfer protocols that organizations use today are SMB and SCP.
SMB or Server Message Block transfer is an application-layer transfer protocol that is primarily used to support transfer between network-connected devices. Often, Network Attached Storage or NAS devices, printers, or other devices that communicate over the network benefit from SMB. SCP or Secure Copy Protocol uses secure shell (SSH) to securely transfer files from a local endpoint to a remote host and does so in a very similar manner to FTP with enhanced security built into the transfer protocol.