In this chapter, you will learn how to use those legacy proprietary and broken protocols, still hanging around on almost every network, to your advantage and gain the access that you want. This is Bo's favorite attack vector, his favorite low-hanging fruit, and normally results in the total pwnage of the domain and every account associated with that domain. Over a year, most likely 80% of the epic-fail testing results come from this attack vector in some manner of exploit.
Why is it that the first machines that I target are Windows systems? The answer is: NetBIOS, LLMNR, NTML, and the SMB protocols.
In this chapter, we will cover the following topics:
- NetBIOS name service and NTLM
- Sniffing and capturing traffic