[go: up one dir, main page]

Davis - Google Patents

Adversary-in-the-Middle: Poisoning Windows Name Resolution Services for SMB-Relay

Davis

View PDF
Document ID
3983088575889424562
Author
Davis J

External Links

Snippet

Adversary-in-the-Middle: Poisoning Windows Name Resolution Services for SMB-Relay Page 1 TOPIC: AITM Poison Windows Name Resolution Services for SMB-Relay Page 1 Adversary-in-the-Middle: Poisoning Windows Name Resolution Services for SMB-Relay …
Continue reading at jacendavis.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/56Packet switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/06Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
    • H04W4/10Push-to-Talk mobile application services or Push-on-Call mobile application services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/12Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control

Similar Documents

Publication Publication Date Title
US10382436B2 (en) Network security based on device identifiers and network addresses
US10542006B2 (en) Network security based on redirection of questionable network access
US10652210B2 (en) System and method for redirected firewall discovery in a network environment
US7568107B1 (en) Method and system for auto discovery of authenticator for network login
US7792990B2 (en) Remote client remediation
US7308710B2 (en) Secured FTP architecture
US8121030B2 (en) Network service monitoring
US8381281B2 (en) Authenticating a remote host to a firewall
Metongnon et al. Beyond telnet: Prevalence of iot protocols in telescope and honeypot measurements
CN114995214A (en) Method, system, device, equipment and storage medium for remotely accessing application
Sangster et al. Network endpoint assessment (NEA): Overview and requirements
LaCroix et al. Cookies and sessions: a study of what they are, how they work and how they can be stolen
Rahman et al. Holistic approach to arp poisoning and countermeasures by using practical examples and paradigm
Jones Operational Security Requirements for Large Internet Service Provider (ISP) IP Network Infrastructure
Dey et al. Warezmaster and Warezclient: An implementation of FTP based R2L attacks
Lee et al. Threats hidden in office network: Mechanism of credential harvesting for lateral movement
Dulik Deploying fake network devices to obtain sensitive user data
Norton An ettercap primer
Shah et al. Security Issues in Next Generation IP and Migration Networks
Davis Adversary-in-the-Middle: Poisoning Windows Name Resolution Services for SMB-Relay
Metongnon et al. Prevalence of IoT protocols in telescope and honeypot measurements
Janbeglou et al. Redirecting outgoing DNS requests toward a fake DNS server in a LAN
Tajdini et al. IPv6 Common Security Vulnerabilities and Tools: Overview of IPv6 with Respect to Online Games
Adeel et al. Honeynets: An Architectural Overview
Garrett GIAC Certified Firewall Analyst Practical Assignment v2. 0 Firewalls, Perimeter Protection, and VPNs