Skip to main content

What is the SMB Protocol?


What is the SMB Protocol?

Even if you haven’t heard of the SMB protocol, millions of people use it every day.

The Server Message Block (SMB) is a network protocol that enables users to communicate with remote computers and servers — to use their resources or share, open, and edit files. It’s also referred to as the server/client protocol, as the server has a resource that it can share with the client.

Important SMB implementations include

CIFS • Samba • NQ • MoSMB • Likewise • Tuxera SMB

SMB requires network ports on a computer or server to enable communication to other systems & it uses either port 139 or 445. 

Port 139 • SMB originally ran on top of NetBIOS using port 139. NetBIOS is an older transport layer that allows Windows computers to talk to each other on the same network.

Port 445 • Later versions of SMB (after Windows 2000) began to use port 445 on top of a TCP stack. Using TCP allows SMB to work over the internet.

Comments

Popular posts from this blog

Learn Ethical hacking with practical language.

Types of hackers A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc. Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner. Script kiddies: A non-skilled person who gains access to computer systems using already made tools. #intermediate Getting started with Nmap Nmap is the world's leading port scanner. Nmap, as an online port scanner, can scan your perimeter network ...

How to recognize a Scam?

Check Scam Adviser Before You Buy  Click Here As the influence of the internet rises, so does the prevalence of online scams. There are fraudsters making all kinds of claims to trap victims online - from fake investment opportunities to online stores - and the internet allows them to operate from any part of the world with anonymity. The ability to spot online scams is an important skill to have as the virtual world is increasingly becoming a part of every facet of our lives. The below tips will help you identify the signs which can indicate that a website could be a scam. Common Sense: Too Good To Be True When looking for goods online, a great deal can be very enticing. A Gucci bag or a new iPhone for half the price? Who wouldn’t want to grab such a deal? Scammers know this too and try to take advantage of the fact.If an online deal looks too good to be true, think twice and double-check things. The easiest way to do this is to simply check out the same product at compe...

What are Ports?

On a TCP/IP network every device must have an IP address. However an IP address alone is not sufficient for running network applications, as a computer can run multiple applications and/or services. Just as the IP address identifies the computer, The network port identifies the application or service running on the computer. • Analogy If you use a house or apartment block analogy the IP address corresponds to the street address. All of the apartments share the same street address. However each apartment also has an apartment number which corresponds to the Port number.