My statements were in direct reply with your statement --
"...but I have never seen nor heard of any machine that was breached because of their being
present."
I merely provided the contrary.
In respect to your last reply, I can't disagree with it.
Dave
| By your reasoning, because the admin shares are used as an
| attack vector, and I will state again as a vector that only works
| in their favor AFTER they have admin credentials, we should
| not use anything that may be used as part of an attack vector.
| What I said is that the admin shares in and of themselves are
| not the issue. That I do believe as I have thousands of machines
| with them enabled and do not have a worm problem.
| The issue is weak passwording of administrative accounts.
| Without administrative credentials, the admin shares are of no
| use whatsoever. Disabling admin shares does not remove IPC$
| so one cannot say that disabling them removes the way where
| one can test to find an admin uid/pwd combination.
| By your reasoning, which seems to be, because these can be
| used to propagate a worm they should be removed, then we
| should remove all RPC, heck, even the NIC and net wire !
|
| Please, think a bit more deeply and critically at what it is that I did
| say. The machines are not breached because of the admin
| shares but because of the failure to secure admin accounts
| and then this make the admin shares of use. However, even
| without the admin shares, the admin credentials would give away
| the machine.
|
| Nice try at making me aware of issue about which I do have an
| awareness, but I just do not buy into your reasoning even if it is
| the commonly held viewpoint today. Years ago I was paranoid
| about the admin shares; today I recognize the real issue is
| elsewhere.
|
| --
| Roger Abell
| Microsoft MVP (Windows Server System: Security)
| MCDBA, MCSE W2k3+W2k+Nt4
| | > Like I stated -- Some of the above have "quite an extensive list" of known
| > passwords to use
| > against the hidden shares."
| >
| > Please take the time and READ the URLs I provided and you will see that
| > the VX'ers have
| > certainly done their homework in writing their respective code to infect
| > targeted platforms.
| >
| > I also suggest you spend some time in the following News Groups --
| > microsoft.public.scripting.virus.discussion
| > microsoft.public.security.virus
| > alt.comp.virus
| > alt.comp.anti-virus
| >
| > I haven't seen you there. ;-)
| >
| > Dave
| >
| >
| >
| >
| > | > | Administrative shares require credentials of an admin to
| > | be accessed.
| > | The shares in and of themselves are not a security problem.
| > | Giving away administrative access is a problem, and having
| > | administrative shares present are not a major issue if one
| > | has already given away administrative access/credentials.
| > |
| > | --
| > | Roger Abell
| > | Microsoft MVP (Windows Server System: Security)
| > | MCDBA, MCSE W2k3+W2k+Nt4
| > | | > | > Roger:
| > | > For a MS MVP replying in a "security" related News Group, you don't
| > study
| > | > the actions of
| > | > Internet worms do you.
| > | >
| > | > W32/Sdbot.worm.73728 --
http://vil.nai.com/vil/content/v_100748.htm
| > | > W32/Graps.worm --
http://vil.nai.com/vil/content/v_100467.htm
| > | > W32/Slanper.worm --
http://vil.nai.com/vil/content/v_100445.htm
| > | > W32/Lioten.worm --
http://vil.nai.com/vil/content/v_99897.htm
| > | > W32/Deborm.worm.q --
http://vil.nai.com/vil/content/v_100234.htm
| > | > W32/Sluter.worm -
| > | >
http://vil.nai.com/vil/content/v_100443.htm
| > | >
http://vil.nai.com/vil/content/v_100642.htm
| > | > BAT/Mumu.worm.c --
http://vil.nai.com/vil/content/v_100530.htm
| > | > W32/Gaobot.worm -
| > | >
http://vil.nai.com/vil/content/v_125006.htm
| > | >
http://vil.nai.com/vil/content/v_101447.htm
| > | >
http://vil.nai.com/vil/content/v_100785.htm
| > | > IRC-Vup --
http://vil.nai.com/vil/content/v_100278.htm
| > | > IRC-Smev --
http://vil.nai.com/vil/content/v_99448.htm
| > | > IRC/Flood -
| > | >
http://vil.nai.com/vil/content/v_100361.htm
| > | >
http://vil.nai.com/vil/content/v_100427.htm
| > | >
http://vil.nai.com/vil/content/v_100363.htm
| > | > Egghead --
http://vil.nai.com/vil/content/v_99378.htm
| > | >
| > | >
| > | > I think the above is a good representative list of infectors that
| > | > deliberately attack
| > | > administrative shares such as...
| > | > c$ ~ Z$
| > | > admin$
| > | > print$
| > | > IPC$
| > | >
| > | > MCSE - Microsoft Cant Secure Enough ;-)
| > | >
| > | > Dave
| > | > BTW: Some of the above have "quite an extensive list" of known
| > passwords
| > | > to use against the
| > | > hidden shares. It's no wonder why AR-25-2 requires 10 digit passwords
| > | > using; 2 Upper, 2
| > | > Lower, 2 Numbers and 2 Special chars.
| > | >
| > | >
| > | >
| > | > | > | > | Now that you do have info on the Lanmmanserver reg value to disable
| > the
| > | > | administrative shares, I have to ask why do you want to disable them
| > ?
| > | > |
| > | > | I have seen more people not being able to get back in because these
| > were
| > | > | not available after they had goofed and gotten locked out; but I
| > have
| > | > never
| > | > | seen nor heard of any machine that was breached because of their
| > being
| > | > | present.
| > | > |
| > | > | --
| > | > | Roger Abell
| > | > | Microsoft MVP (Windows Server System: Security)
| > | > | MCDBA, MCSE W2k3+W2k+Nt4
| > | > | | > | > | > how to disable administrator shares?
| > | > | > i heard there is a registry key, that can be modified....
| > | > | > --
| > | > | > thanks,
| > | > | > Raitis
| > | > |
| > | > |
| > | >
| > | >
| > |
| > |
| >
| >
|
|