PEN-10 Windows Vulnerabilities and Common Windows Applications In this challenge you will exploit the vulnerabilities of the SMB protocol.