Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

question about the ability of 135 + 139 to be hacked

Posted on 2004-04-01
6
Medium Priority
?
183 Views
Last Modified: 2013-12-04
Hi i am wondering how one could gain root access to a windows server threw ports 135 and 139?
0
Comment
Question by:jdissues
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 5

Expert Comment

by:visioneer
ID: 10737537
I'm sure you are.

Questions like that will not be answered here.  
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 10738401
Read a book.
-rich
0
 

Author Comment

by:jdissues
ID: 10746015
well, in response to richrumbles comment, what book would you suggest. ???
0
Are You Ready for GDPR?

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

 
LVL 5

Expert Comment

by:visioneer
ID: 10746478
A book that tells you how to hack stuff, which is not the kind of advice given out here.
0
 

Author Comment

by:jdissues
ID: 10747759
well, visioneer, i would like to know to know how to secure a network, anyone who wants to attempt to make a semi secure network needs to know how the attack could be accomplished. for instance i need to know how a buffer overflow works in order to know how to prevent it from happening. all im asking is that you either A: tell me a place to find the information, or B: just tell me yourself, if expert exchange laws prevent you from doing so than, i accept that but if not i would appriciate it if you could help me
0
 
LVL 5

Accepted Solution

by:
Droby10 earned 200 total points
ID: 10748031
for starters i'd go with dce/rpc over smb by luke kenneth casson leighton.  then i'd move into modelling and analysis of security protocols by ryan and schneider.   then i'd look at com and atl 3.0 from troelsen which does a pretty good job of describing the rpc and lrpc.  you might find power programming with rpc by bloomer to be pretty information and if you can locate a copy of nfs illustrated by callaghan, then the framework of xdr to onc rpc is layed out beautifully.

enjoy.
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question