I get at least one of the following for just about any Windows host I scan, but what exactly does it mean? Does it mean I can actually login to the box and view it's contents? How? I've tried every way I can think of, but I haven't been able to figure it out. Oh, and no, I'm not trying to view other people's data, just trying to understand the process of how it works so I'll know how to protect against it. I'm sure that's assumed for the people on this list, but just so there's no confusion... :-).
---------------------------------------------------------------------------------- . It was possible to log into the remote host using the following login/password combinations : 'guest'/'' . It was possible to log into the remote host using a NULL session. The concept of a NULL session is to provide a null username and a null password, which grants the user the 'guest' access To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and Q246261 (Windows 2000). Note that this won't completely disable null sessions, but will prevent them from connecting to IPC$ . All the smb tests will be done as 'guest'/'' in domain ------------------------------------------------------------------------------------ . It was possible to log into the remote host using a NULL session. The concept of a NULL session is to provide a null username and a null password, which grants the user the 'guest' access To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and Q246261 (Windows 2000). Note that this won't completely disable null sessions, but will prevent them from connecting to IPC$ . All the smb tests will be done as ''/'' in domain -- Jared - [EMAIL PROTECTED]: general discussions about Nessus. * To unsubscribe, send a mail to [EMAIL PROTECTED] with "unsubscribe nessus" in the body. * To subscribe again, send a mail to [EMAIL PROTECTED] with "subscribe nessus" in the body
