Summary TODO Protocol Specific Attacks The Concept of Attacks TODO Service Misconfigurations TODO Finding Sensitive Information TODO FTP TODO SMB TODO SQL Databases TODO RDP TODO DNS TODO SMTP TODO