These are the sources and citations used to research DSL: Report. This bibliography was generated on Cite This For Me on

  • Website

    Boyd, I.

    How to grant network access to LocalSystem account?

    2017

    In-text: (Boyd, 2017)

    Your Bibliography: Boyd, I., 2017. How to grant network access to LocalSystem account?. [online] Server Fault. Available at: <https://serverfault.com/questions/135867/how-to-grant-network-access-to-localsystem-account> [Accessed 18 December 2021].

  • Website

    Security Primer - EternalBlue

    2019 - MS-ISAC

    In-text: (Security Primer - EternalBlue, 2019)

    Your Bibliography: Cisecurity.org. 2019. Security Primer - EternalBlue. [online] Available at: <https://www.cisecurity.org/wp-content/uploads/2019/01/Security-Primer-EternalBlue.pdf> [Accessed 13 December 2021].

  • Website

    Review: Metasploit Framework + Armitage - Pentesting Tools

    2020

    In-text: (Review: Metasploit Framework + Armitage - Pentesting Tools, 2020)

    Your Bibliography: CyberSecurity Forum. 2020. Review: Metasploit Framework + Armitage - Pentesting Tools. [online] Available at: <https://cybersecurityforum.com/cybersecurity-tools/reviews/metasploit-framework/> [Accessed 18 December 2021].

  • Website

    Windows Version Numbers - Version and build numbers of Microsoft Windows

    2018

    In-text: (Windows Version Numbers - Version and build numbers of Microsoft Windows, 2018)

    Your Bibliography: Gaijin.at. 2018. Windows Version Numbers - Version and build numbers of Microsoft Windows. [online] Available at: <https://www.gaijin.at/en/infos/windows-version-numbers> [Accessed 17 December 2021].

  • Website

    Grossman, N.

    EternalBlue - Everything There Is To Know

    2017 - Nadav Grossman

    In-text: (Grossman, 2017)

    Your Bibliography: Grossman, N., 2017. EternalBlue - Everything There Is To Know. [online] Check Point Research. Available at: <https://research.checkpoint.com/2017/eternalblue-everything-know/> [Accessed 16 December 2021].

  • Website

    What is a Buffer Overflow | Attack Types

    In-text: (What is a Buffer Overflow | Attack Types, n.d.)

    Your Bibliography: Imperva. n.d. What is a Buffer Overflow | Attack Types. [online] Available at: <https://www.imperva.com/learn/application-security/buffer-overflow/> [Accessed 15 December 2021].

  • Website

    Equation Group: The Crown Creator of Cyber-Espionage

    2015

    In-text: (Equation Group: The Crown Creator of Cyber-Espionage, 2015)

    Your Bibliography: Kaspersky.com. 2015. Equation Group: The Crown Creator of Cyber-Espionage. [online] Available at: <https://www.kaspersky.com/about/press-releases/2015_equation-group-the-crown-creator-of-cyber-espionage> [Accessed 16 December 2021].

  • Website

    Obbayi, L.

    Ethical hacking: Passive information gathering - Infosec Resources

    2019

    In-text: (Obbayi, 2019)

    Your Bibliography: Obbayi, L., 2019. Ethical hacking: Passive information gathering - Infosec Resources. [online] Infosec Resources. Available at: <https://resources.infosecinstitute.com/topic/ethical-hacking-passive-information-gathering-with-maltego/> [Accessed 17 December 2021].

  • Website

    Metasploit Post Exploitation Modules

    2015

    In-text: (Metasploit Post Exploitation Modules, 2015)

    Your Bibliography: Offensive-security.com. 2015. Metasploit Post Exploitation Modules. [online] Available at: <https://www.offensive-security.com/metasploit-unleashed/windows-post-gather-modules/> [Accessed 18 December 2021].

  • Website

    Meterpreter Backdoor

    2015

    In-text: (Meterpreter Backdoor, 2015)

    Your Bibliography: Offensive-security.com. 2015. Meterpreter Backdoor. [online] Available at: <https://www.offensive-security.com/metasploit-unleashed/meterpreter-backdoor/> [Accessed 18 December 2021].

  • Website

    METERPRETER BASIC COMMANDS

    2015

    In-text: (METERPRETER BASIC COMMANDS, 2015)

    Your Bibliography: Offensive-security.com. 2015. METERPRETER BASIC COMMANDS. [online] Available at: <https://www.offensive-security.com/metasploit-unleashed/meterpreter-basics/> [Accessed 18 December 2021].

  • Website

    Petters, J.

    What is Metasploit? The Beginner's Guide - Varonis

    2020 - Jeff Petters

    In-text: (Petters, 2020)

    Your Bibliography: Petters, J., 2020. What is Metasploit? The Beginner's Guide - Varonis. [online] Varonis. Available at: <https://www.varonis.com/blog/what-is-metasploit/> [Accessed 17 December 2021].

  • Website

    What is Meterpreter ? - Security Wiki

    2018

    In-text: (What is Meterpreter ? - Security Wiki, 2018)

    Your Bibliography: Secret Double Octopus. 2018. What is Meterpreter ? - Security Wiki. [online] Available at: <https://doubleoctopus.com/security-wiki/threats-and-tools/meterpreter/> [Accessed 18 December 2021].

  • Website

    Sheldon, R. and Scarpati, J.

    What is the Server Message Block (SMB) protocol? How does it work?

    2021

    In-text: (Sheldon and Scarpati, 2021)

    Your Bibliography: Sheldon, R. and Scarpati, J., 2021. What is the Server Message Block (SMB) protocol? How does it work?. [online] Techtarget. Available at: <https://www.techtarget.com/searchnetworking/definition/Server-Message-Block-Protocol> [Accessed 15 December 2021].

  • Website

    V, D.

    How does the EternalBlue Exploit Work?

    2017

    In-text: (V, 2017)

    Your Bibliography: V, D., 2017. How does the EternalBlue Exploit Work?. [online] Information Security Stack Exchange. Available at: <https://security.stackexchange.com/questions/159654/how-does-the-eternalblue-exploit-work> [Accessed 16 December 2021].

Click here to start building your own bibliography
Keep on Citing!
Cite This For Me:
The Easiest Tool to Create your Bibliographies Online
Join Us!

Save Time and Improve Your Marks with Cite This For Me

10,587 students joined last month!

  • ✔ Save your bibliographies for longer
  • ✔ Quick and accurate citation program
  • ✔ Save time when referencing
  • ✔ Make your student life easy and fun
  • ✔ Pay only once with our Forever plan
  • ✔ Use plagiarism checker
  • ✔ Create and edit multiple bibliographies
Join