Solved

question about the ability of 135 + 139 to be hacked

Posted on 2004-04-01
6
176 Views
Last Modified: 2013-12-04
Hi i am wondering how one could gain root access to a windows server threw ports 135 and 139?
0
Comment
Question by:jdissues
6 Comments
 
LVL 5

Expert Comment

by:visioneer
ID: 10737537
I'm sure you are.

Questions like that will not be answered here.  
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 10738401
Read a book.
-rich
0
 

Author Comment

by:jdissues
ID: 10746015
well, in response to richrumbles comment, what book would you suggest. ???
0
Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 
LVL 5

Expert Comment

by:visioneer
ID: 10746478
A book that tells you how to hack stuff, which is not the kind of advice given out here.
0
 

Author Comment

by:jdissues
ID: 10747759
well, visioneer, i would like to know to know how to secure a network, anyone who wants to attempt to make a semi secure network needs to know how the attack could be accomplished. for instance i need to know how a buffer overflow works in order to know how to prevent it from happening. all im asking is that you either A: tell me a place to find the information, or B: just tell me yourself, if expert exchange laws prevent you from doing so than, i accept that but if not i would appriciate it if you could help me
0
 
LVL 5

Accepted Solution

by:
Droby10 earned 50 total points
ID: 10748031
for starters i'd go with dce/rpc over smb by luke kenneth casson leighton.  then i'd move into modelling and analysis of security protocols by ryan and schneider.   then i'd look at com and atl 3.0 from troelsen which does a pretty good job of describing the rpc and lrpc.  you might find power programming with rpc by bloomer to be pretty information and if you can locate a copy of nfs illustrated by callaghan, then the framework of xdr to onc rpc is layed out beautifully.

enjoy.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question