DCOM
The DCOM exploits test DCOM Registry keys and DCOM permissions.