That is part of it. Null sessions are unathenticated sessions used primarily
in networking/file and print sharing, downlevel trusts, the browse service,
and some password changes. Null sessions can be used to extract a lot of
information from a computer such as security settings, and user and group
names which is why it is a vulnerability that can be expolited, particulary
by attackers from untrusted networks and why a firewall is important. There
are registry/security policy settings that can limit what info null sessions
can access such as "additional restrictions fro anonymous connections" in
W2K. The most restrictive setting should be used with care as it can break a
lot of things on a network, particularly if the network is not all W2K. See
the links below for more information. --- Steve
http://www.sans.org/rr/papers/index.php?id=286
http://support.microsoft.com/?kbid=246261
http://www.somarsoft.com/ -- Dumpsec tool for enumerating info