• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 213
  • Last Modified:

win2k hidden shares

win2k has hidden shares such as

What are each of them used for?
how to disable the share? what is the impact?
  • 2
1 Solution
ADMIN$ = c:\WinNT (default)  This is so that admin's can access a machine's system directory remotely.

C$ = (and D$ etc, for each permanent drive) - Administrative access to the root drives.

IPC$ = authentication.

Removing everything other than the IPC$ share will probably be "safe" - they're mainly there for ease of management etc.

IPC$ handles some auth. and you won't be able to remove this and have people authenticating TO your computer, I'm not sure how/if it will affect connections FROM your computer.

Disabling the non-IPC$ shares is simply locating the share point, and doing the "right-click | Sharing | Remove share" dance.
Of course, if your machine is actually on a corporate network your sysadmin might not be happy about you deleting the default shares, since they're useful tools for things like scheduled backups...
klohAuthor Commented:
u mean there is no way to remove IPC$?
where is IPC actual location?
still dun know how to disable the others. hidden shares, how to right-click?
more details pls.

To disable C$, open explorer, and right click C: drive, then select "sharing".  Set the radio button to "Do not share this drive".

To disable ADMIN$, open explorer, browse C: drive and right click c:\WinNT, then select sharing.  Set the radio button to "Do not share this drive".

As for IPC$, I'll give you a quote from www.nttoolbox.com

"IPC$ is the hidden share for Interprocess Communication. The primary function responsible for
Remote Procedure Calls (RPC). If you are on a network and rely on RPC,It's a good idea to leave IPC$ intact for Win32 object process and thread termination.Within 16 bit applications this is done through WOW (Windows on windows) rather than Win32 (Still needing IPC)."

Hope that helps.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Train for your Pen Testing Engineer Certification

Enroll today in this bundle of courses to gain experience in the logistics of pen testing, Linux fundamentals, vulnerability assessments, detecting live systems, and more! This series, valued at $3,000, is free for Premium members, Team Accounts, and Qualified Experts.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now