A new technique for exploiting an 18-year-old bug in Windows Server Message Block (SMB), which would allow attackers to intercept user credentials, had been uncovered by Cylance researcher Brian Wallace.
SMB is a core component in Windows networking, and can be found - and is enabled by default - in all versions of the Windows OS, including Windows 10.
"Redirect to SMB is a way for attackers to steal valuable user credentials by hijacking communications with legitimate web servers via man-in-the-middle attacks, then sending them to malicious SMB (server message block) servers that force them to spit out the victim's username, domain and hashed password," the researcher explained.
Continued : http://www.net-security.org/secworld.php?id=18210
Related :
Unpatched 18 year-old Windows man-in-the-middle diddle revived
New SMB Flaw Affects All Versions of Windows

Chowhound
Comic Vine
GameFAQs
GameSpot
Giant Bomb
TechRepublic