What command is used in a Linux environment eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for what command is used in a Linux environment to simulate a worm attack that exploits the SMB protocol, given that the target system is

Full Certification Question

What command is used in a Linux environment to simulate a worm attack that exploits the SMB protocol, given that the target system is unprotected?