📘
DFIR
search
Ctrlk
  • Networking
    • Networkingchevron-right
  • Windows
    • Administrationchevron-right
    • Forensicschevron-right
    • Cheat Sheetchevron-right
    • Investigationchevron-right
    • Internalschevron-right
      • Structurechevron-right
        • SMBchevron-right
          • Admin
          • Attacks
        • Alternate Data Streams
        • Protocolschevron-right
        • WinAPI
        • COM Objects
        • Files Types
        • DLLschevron-right
        • Folders of Interest
      • Privilegeschevron-right
      • Applicationschevron-right
    • Active Directorychevron-right
    • MISCchevron-right
  • Linux
    • Forensicschevron-right
    • SSH
    • Linux WebShells
    • Directories of Interest
    • Internalschevron-right
  • Enterprise Architecture
    • CI/CD Piplinechevron-right
    • Citrixchevron-right
    • Web Applicationschevron-right
    • The Cloudchevron-right
    • vSpherechevron-right
    • Containerschevron-right
    • Troubleshootingchevron-right
  • Mac
    • Forensicschevron-right
  • Attacker Information
    • Adversary Operationschevron-right
    • Actor Playbookschevron-right
    • Abused Domains
  • IR Playbook
    • Activity from Unmanaged Host
    • Recommendations
  • Reverse Engineering
    • Python - Pyinstaller
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Windowschevron-right
  2. Internalschevron-right
  3. Structure

SMB

hashtag
DFS

LogoBypass Offline Files With This One Trickdxpetti.comchevron-right

hashtag
Internals

LogoDetermining Which Process Is Making SMB Requests On Windowsxkln.netchevron-right
LogoHow to trace SMB connection to what process initiated the connection?Information Security Stack Exchangechevron-right
PreviousStructurechevron-leftNextAdminchevron-right

Last updated 2 years ago

  • DFS
  • Internals