Davis - Google Patents
Adversary-in-the-Middle: Poisoning Windows Name Resolution Services for SMB-RelayDavis
View PDF- Document ID
- 3983088575889424562
- Author
- Davis J
External Links
Snippet
Adversary-in-the-Middle: Poisoning Windows Name Resolution Services for SMB-Relay
Page 1 TOPIC: AITM Poison Windows Name Resolution Services for SMB-Relay Page 1
Adversary-in-the-Middle: Poisoning Windows Name Resolution Services for SMB-Relay …
- 231100000572 poisoning 0 title description 18
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
- H04W4/10—Push-to-Talk mobile application services or Push-on-Call mobile application services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/12—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10382436B2 (en) | Network security based on device identifiers and network addresses | |
US10542006B2 (en) | Network security based on redirection of questionable network access | |
US10652210B2 (en) | System and method for redirected firewall discovery in a network environment | |
US7568107B1 (en) | Method and system for auto discovery of authenticator for network login | |
US7792990B2 (en) | Remote client remediation | |
US7308710B2 (en) | Secured FTP architecture | |
US8121030B2 (en) | Network service monitoring | |
US8381281B2 (en) | Authenticating a remote host to a firewall | |
Metongnon et al. | Beyond telnet: Prevalence of iot protocols in telescope and honeypot measurements | |
CN114995214A (en) | Method, system, device, equipment and storage medium for remotely accessing application | |
Sangster et al. | Network endpoint assessment (NEA): Overview and requirements | |
LaCroix et al. | Cookies and sessions: a study of what they are, how they work and how they can be stolen | |
Rahman et al. | Holistic approach to arp poisoning and countermeasures by using practical examples and paradigm | |
Jones | Operational Security Requirements for Large Internet Service Provider (ISP) IP Network Infrastructure | |
Dey et al. | Warezmaster and Warezclient: An implementation of FTP based R2L attacks | |
Lee et al. | Threats hidden in office network: Mechanism of credential harvesting for lateral movement | |
Dulik | Deploying fake network devices to obtain sensitive user data | |
Norton | An ettercap primer | |
Shah et al. | Security Issues in Next Generation IP and Migration Networks | |
Davis | Adversary-in-the-Middle: Poisoning Windows Name Resolution Services for SMB-Relay | |
Metongnon et al. | Prevalence of IoT protocols in telescope and honeypot measurements | |
Janbeglou et al. | Redirecting outgoing DNS requests toward a fake DNS server in a LAN | |
Tajdini et al. | IPv6 Common Security Vulnerabilities and Tools: Overview of IPv6 with Respect to Online Games | |
Adeel et al. | Honeynets: An Architectural Overview | |
Garrett | GIAC Certified Firewall Analyst Practical Assignment v2. 0 Firewalls, Perimeter Protection, and VPNs |