I get at least one of the following for just about any Windows host I scan,
but what exactly does it mean?  Does it mean I can actually login to the
box and view it's contents?  How?  I've tried every way I can think of, but
I haven't been able to figure it out.  Oh, and no, I'm not trying to view
other people's data, just trying to understand the process of how it works
so I'll know how to protect against it.  I'm sure that's assumed for the
people on this list, but just so there's no confusion... :-).

----------------------------------------------------------------------------------
. It was possible to log into the remote host using the following
login/password combinations :
'guest'/''

. It was possible to log into the remote host using a NULL session.
The concept of a NULL session is to provide a null username and
a null password, which grants the user the 'guest' access

To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and
Q246261 (Windows 2000).
Note that this won't completely disable null sessions, but will
prevent them from connecting to IPC$

. All the smb tests will be done as 'guest'/'' in domain

------------------------------------------------------------------------------------

. It was possible to log into the remote host using a NULL session.
The concept of a NULL session is to provide a null username and
a null password, which grants the user the 'guest' access

To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and
Q246261 (Windows 2000).
Note that this won't completely disable null sessions, but will
prevent them from connecting to IPC$

. All the smb tests will be done as ''/'' in domain

--
Jared

-
[EMAIL PROTECTED]: general discussions about Nessus.
* To unsubscribe, send a mail to [EMAIL PROTECTED] with
"unsubscribe nessus" in the body.
* To subscribe again, send a mail to [EMAIL PROTECTED] with
"subscribe nessus" in the body

Reply via email to