Protection Measure:

What we have shown you here is called a ‘Null session attack’. Such attacks can be carried out through the ports 137, 138, 139 and 445
on your PC. If you are a Windows XP user, the first precautionary measure to
implement is to install Service Pack 3 without fail. The improved firewall included
with it prevents null session attacks, so that at least if someone tries to log in to
your PC over the Internet, it is blocked. To guard yourself against computers inlocal networks you need to close the respective ports with a firewall. If you absolutely require one or more of these ports to be open in your firewall, start the
Registry editor, accessible from

‘Start |Run | regedit.exe’
and create the new
Dword values ‘AutoShareServer’ and ‘AutoShareWks’ in the

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\lanmanserver\ parameters

Assign the value ‘0’ to each of the items and restart your computer. With that, the administrative holes that can be used in attacks are deactivated.

0 comments:

Post a Comment

PlEaSe Use website title tag whenever linking your website to this blog

 
feedburner
Bookmark and Share

Enter your email address:

Delivered by FeedBurner