Abstract

SMB protocol or server message block, one of Windows-based file sharing and network communication’s cornerstones, has been subjected to concerns and examination of its security for a long time. However, as another episode in these concerns, a new spectre has arrived – SMBleeding Ghost. This abstract explains the details of the above-stated horror, discussing its starting points, effects, and ways of prevention. SMBleeding Ghost, as the name signifies, uses the SMB protocol stack vulnerabilities. Specifically, it occurs as a result of memory allocation weaknesses and the twisting of SMB packets developed to exploit these weaknesses. The latter is reserved for memory violation and, thus, may be used for remote code execution or trigger additional fancy issues including denial-of-service breaches and data leaks. Key Words: The 5 keywords will be listed below

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call