New Training: Host Protocol Attacks and Tools
| new skills - Team Nuggets

New Training: Host Protocol Attacks and Tools

In this 9-video skill, CBT Nuggets trainer Bob Salmans examines weaknesses in several host based protocols such as SMB, SMTP, SNMP, and LLMNR. We’ll not only look at the protocol weaknesses but we’ll also look at how to exploit them. Watch this new CompTIA training.

Watch the full course: CompTIA PenTest+

This training includes:

  • 9 videos
  • 1 hour of training

You’ll learn these topics in this skill:

  • Host Protocol Attacks and Tools Overview
  • Server Message Block (SMB) Protocol
  • Attacking the SMB Protocol
  • Simple Network Management Protocol (SNMP)
  • Exploiting the SNMP Protocol
  • Denial of Service Attacks
  • Analyzing the LLMNR Protocol
  • Attacking the LLMNR Protocol
  • Host Protocol Attacks and Tools Review

What are the Vulnerability Risks Associated with the SMB Protocol?

The SMB Protocol is one of the most common network protocols that supports communication between network-connected devices such as workstations, Network Attached Storage or NAS devices, printers, and other various devices found in the modern IT environment. Unfortunately, SMB is also one of the most highly exploited communication protocols when due to some underlying vulnerability issues.

Pre-2017 the SMB protocol exposed a serious vulnerability that was used by hackers to gain entry to an organization's IT environment and stage malicious cyber attacks. This vulnerability was patched; however, some organizations to this day haven't applied the patch, leaving their environment extremely exposed to formidable hackers.

SMB is such a security risk since malware can propagate with ease once gaining access to an organization's IT environment. To this point, once malware breaches a network, it will start to infect workloads and attempt to encrypt backups stealthily so that once an organization realizes they've been breached, all of their production data and backup data have been encrypted.

Download

Download

Ultimate Security Cert Guide

A 62-page guide to every Palo Alto, Offensive Security, (ISC)2, Check Point, CompTIA, and Cisco certification, and how they fit into your career.

I have read and understood the privacy policy, and am able to consent to it.

LEARNING ON MOBILE

Learn anytime anywhere with our mobile apps.

I have read and understood the privacy policy and am able to consent to it.

© 2021 CBT Nuggets. All rights reserved. Terms | Privacy Policy | Accessibility | Sitemap | 1550 Valley River Drive, Eugene, OR 97401 | 541-284-5522
CBT Nuggets