Network-Based Vulnerabilities Name Resolution Exploits NetBIOS Name Service LLMNR SMB Exploits SNMP Exploits SMTP Exploits FTP Exploits DNS Cache Poinsoning Pass The Hash Man-In-The-Middle Arp Spoofing Replay SSL Striping Downgrade DoS/Stress Test NAC Bypass VLAN Hopping