These are the sources and citations used to research DSL: Report. This bibliography was generated on Cite This For Me on
In-text: (Boyd, 2017)
Your Bibliography: Boyd, I., 2017. How to grant network access to LocalSystem account?. [online] Server Fault. Available at: <https://serverfault.com/questions/135867/how-to-grant-network-access-to-localsystem-account> [Accessed 18 December 2021].
In-text: (Security Primer - EternalBlue, 2019)
Your Bibliography: Cisecurity.org. 2019. Security Primer - EternalBlue. [online] Available at: <https://www.cisecurity.org/wp-content/uploads/2019/01/Security-Primer-EternalBlue.pdf> [Accessed 13 December 2021].
In-text: (Review: Metasploit Framework + Armitage - Pentesting Tools, 2020)
Your Bibliography: CyberSecurity Forum. 2020. Review: Metasploit Framework + Armitage - Pentesting Tools. [online] Available at: <https://cybersecurityforum.com/cybersecurity-tools/reviews/metasploit-framework/> [Accessed 18 December 2021].
In-text: (Windows Version Numbers - Version and build numbers of Microsoft Windows, 2018)
Your Bibliography: Gaijin.at. 2018. Windows Version Numbers - Version and build numbers of Microsoft Windows. [online] Available at: <https://www.gaijin.at/en/infos/windows-version-numbers> [Accessed 17 December 2021].
In-text: (Grossman, 2017)
Your Bibliography: Grossman, N., 2017. EternalBlue - Everything There Is To Know. [online] Check Point Research. Available at: <https://research.checkpoint.com/2017/eternalblue-everything-know/> [Accessed 16 December 2021].
In-text: (What is a Buffer Overflow | Attack Types, n.d.)
Your Bibliography: Imperva. n.d. What is a Buffer Overflow | Attack Types. [online] Available at: <https://www.imperva.com/learn/application-security/buffer-overflow/> [Accessed 15 December 2021].
In-text: (Equation Group: The Crown Creator of Cyber-Espionage, 2015)
Your Bibliography: Kaspersky.com. 2015. Equation Group: The Crown Creator of Cyber-Espionage. [online] Available at: <https://www.kaspersky.com/about/press-releases/2015_equation-group-the-crown-creator-of-cyber-espionage> [Accessed 16 December 2021].
In-text: (Obbayi, 2019)
Your Bibliography: Obbayi, L., 2019. Ethical hacking: Passive information gathering - Infosec Resources. [online] Infosec Resources. Available at: <https://resources.infosecinstitute.com/topic/ethical-hacking-passive-information-gathering-with-maltego/> [Accessed 17 December 2021].
In-text: (Metasploit Post Exploitation Modules, 2015)
Your Bibliography: Offensive-security.com. 2015. Metasploit Post Exploitation Modules. [online] Available at: <https://www.offensive-security.com/metasploit-unleashed/windows-post-gather-modules/> [Accessed 18 December 2021].
In-text: (Meterpreter Backdoor, 2015)
Your Bibliography: Offensive-security.com. 2015. Meterpreter Backdoor. [online] Available at: <https://www.offensive-security.com/metasploit-unleashed/meterpreter-backdoor/> [Accessed 18 December 2021].
In-text: (METERPRETER BASIC COMMANDS, 2015)
Your Bibliography: Offensive-security.com. 2015. METERPRETER BASIC COMMANDS. [online] Available at: <https://www.offensive-security.com/metasploit-unleashed/meterpreter-basics/> [Accessed 18 December 2021].
In-text: (Petters, 2020)
Your Bibliography: Petters, J., 2020. What is Metasploit? The Beginner's Guide - Varonis. [online] Varonis. Available at: <https://www.varonis.com/blog/what-is-metasploit/> [Accessed 17 December 2021].
In-text: (What is Meterpreter ? - Security Wiki, 2018)
Your Bibliography: Secret Double Octopus. 2018. What is Meterpreter ? - Security Wiki. [online] Available at: <https://doubleoctopus.com/security-wiki/threats-and-tools/meterpreter/> [Accessed 18 December 2021].
In-text: (Sheldon and Scarpati, 2021)
Your Bibliography: Sheldon, R. and Scarpati, J., 2021. What is the Server Message Block (SMB) protocol? How does it work?. [online] Techtarget. Available at: <https://www.techtarget.com/searchnetworking/definition/Server-Message-Block-Protocol> [Accessed 15 December 2021].
In-text: (V, 2017)
Your Bibliography: V, D., 2017. How does the EternalBlue Exploit Work?. [online] Information Security Stack Exchange. Available at: <https://security.stackexchange.com/questions/159654/how-does-the-eternalblue-exploit-work> [Accessed 16 December 2021].
10,587 students joined last month!