Solved

question about the ability of 135 + 139 to be hacked

Posted on 2004-04-01
6
181 Views
Last Modified: 2013-12-04
Hi i am wondering how one could gain root access to a windows server threw ports 135 and 139?
0
Comment
Question by:jdissues
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 5

Expert Comment

by:visioneer
ID: 10737537
I'm sure you are.

Questions like that will not be answered here.  
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 10738401
Read a book.
-rich
0
 

Author Comment

by:jdissues
ID: 10746015
well, in response to richrumbles comment, what book would you suggest. ???
0
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

 
LVL 5

Expert Comment

by:visioneer
ID: 10746478
A book that tells you how to hack stuff, which is not the kind of advice given out here.
0
 

Author Comment

by:jdissues
ID: 10747759
well, visioneer, i would like to know to know how to secure a network, anyone who wants to attempt to make a semi secure network needs to know how the attack could be accomplished. for instance i need to know how a buffer overflow works in order to know how to prevent it from happening. all im asking is that you either A: tell me a place to find the information, or B: just tell me yourself, if expert exchange laws prevent you from doing so than, i accept that but if not i would appriciate it if you could help me
0
 
LVL 5

Accepted Solution

by:
Droby10 earned 50 total points
ID: 10748031
for starters i'd go with dce/rpc over smb by luke kenneth casson leighton.  then i'd move into modelling and analysis of security protocols by ryan and schneider.   then i'd look at com and atl 3.0 from troelsen which does a pretty good job of describing the rpc and lrpc.  you might find power programming with rpc by bloomer to be pretty information and if you can locate a copy of nfs illustrated by callaghan, then the framework of xdr to onc rpc is layed out beautifully.

enjoy.
0

Featured Post

Ready to trade in that old firewall?

Whether you need to trade-up to a shiny new Firebox or just ready to upgrade from whatever appliance you're using now, WatchGuard has the right appliance for you! Find your perfect Firebox today with appliance sizing tool!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question