DCOM

The DCOM exploits test DCOM Registry keys and DCOM permissions.