New Training: Host Protocol Attacks and Tools

In this 9-video skill, CBT Nuggets trainer Bob Salmans examines weaknesses in several host based protocols such as SMB, SMTP, SNMP, and LLMNR. We’ll not only look at the protocol weaknesses but we’ll also look at how to exploit them. Watch this new CompTIA training.
Watch the full course: CompTIA PenTest+
This training includes:
9 videos
1 hour of training
You’ll learn these topics in this skill:
Host Protocol Attacks and Tools Overview
Server Message Block (SMB) Protocol
Attacking the SMB Protocol
Simple Network Management Protocol (SNMP)
Exploiting the SNMP Protocol
Denial of Service Attacks
Analyzing the LLMNR Protocol
Attacking the LLMNR Protocol
Host Protocol Attacks and Tools Review
What are the Vulnerability Risks Associated with the SMB Protocol?
The SMB Protocol is one of the most common network protocols that supports communication between network-connected devices such as workstations, Network Attached Storage or NAS devices, printers, and other various devices found in the modern IT environment. Unfortunately, SMB is also one of the most highly exploited communication protocols when due to some underlying vulnerability issues.
Pre-2017 the SMB protocol exposed a serious vulnerability that was used by hackers to gain entry to an organization's IT environment and stage malicious cyber attacks. This vulnerability was patched; however, some organizations to this day haven't applied the patch, leaving their environment extremely exposed to formidable hackers.
SMB is such a security risk since malware can propagate with ease once gaining access to an organization's IT environment. To this point, once malware breaches a network, it will start to infect workloads and attempt to encrypt backups stealthily so that once an organization realizes they've been breached, all of their production data and backup data have been encrypted.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.