B
BOFH
As a part of our new policy to port scan everything several times a year
using nessus, we have come across a couple of things when scanning our
fully patched windows 2003 enterprise servers:
1. It was possible to log into the remote host using a NULL session. The
concept of a NULL session is to provide a null username and a null password,
which grants the user the 'guest' access.
To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and Q246261
(Windows 2000).
Note that this won't completely disable null sessions, but will prevent them
from connecting to IPC$
Please see http://msgs.securepoint.com/cgi-bin/get/nessus-0204/50/1.html
I have set the restrictanonymous registry key to 1 and 2 (with reboots
between the changes) and every scan I run I always get the above message.
Is there a way to disable 'guest' access? Is there some KB Article I missed
that discusses NULL sessions and windows 2003?
2. How do I disable NULL BIND on my LDAP servers? I am not running
exchange.
Thank you for your time,
BOFH1234
using nessus, we have come across a couple of things when scanning our
fully patched windows 2003 enterprise servers:
1. It was possible to log into the remote host using a NULL session. The
concept of a NULL session is to provide a null username and a null password,
which grants the user the 'guest' access.
To prevent null sessions, see MS KB Article Q143474 (NT 4.0) and Q246261
(Windows 2000).
Note that this won't completely disable null sessions, but will prevent them
from connecting to IPC$
Please see http://msgs.securepoint.com/cgi-bin/get/nessus-0204/50/1.html
I have set the restrictanonymous registry key to 1 and 2 (with reboots
between the changes) and every scan I run I always get the above message.
Is there a way to disable 'guest' access? Is there some KB Article I missed
that discusses NULL sessions and windows 2003?
2. How do I disable NULL BIND on my LDAP servers? I am not running
exchange.
Thank you for your time,
BOFH1234