Overview
Explore techniques for identifying and exploiting file share vulnerabilities in a comprehensive conference talk. Delve into SMB/CIFS history, common misconfigurations, and methods for discovering exposed network resources. Learn about tools like Windows Credential Editor, Metasploit, and Nmap for privilege escalation and network enumeration. Discover practical strategies to secure file shares, including tweaking Windows settings, implementing proper network isolation, and adjusting LM compatibility levels. Gain valuable insights into the risks associated with default configurations and hidden shares, equipping yourself with the knowledge to better protect network resources.
Syllabus
Intro
Why this talk?
SMB/CIFS History
Bad Defaults
You, Me & EVERYONE We Know
$ Is Not Really Hidden
Outside Of A Windows Domain?
Getting Accounts
Windows Credential Editor
Metasploit
Nmap Output
SoftPerfect Network Scanner
Basic Tweak
Windows Search
Wireless/Host Isolation
Disabling Admin Network Logon
LMCompatibilityLevel