Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

question about the ability of 135 + 139 to be hacked

Posted on 2004-04-01
6
177 Views
Last Modified: 2013-12-04
Hi i am wondering how one could gain root access to a windows server threw ports 135 and 139?
0
Comment
Question by:jdissues
6 Comments
 
LVL 5

Expert Comment

by:visioneer
ID: 10737537
I'm sure you are.

Questions like that will not be answered here.  
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 10738401
Read a book.
-rich
0
 

Author Comment

by:jdissues
ID: 10746015
well, in response to richrumbles comment, what book would you suggest. ???
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 
LVL 5

Expert Comment

by:visioneer
ID: 10746478
A book that tells you how to hack stuff, which is not the kind of advice given out here.
0
 

Author Comment

by:jdissues
ID: 10747759
well, visioneer, i would like to know to know how to secure a network, anyone who wants to attempt to make a semi secure network needs to know how the attack could be accomplished. for instance i need to know how a buffer overflow works in order to know how to prevent it from happening. all im asking is that you either A: tell me a place to find the information, or B: just tell me yourself, if expert exchange laws prevent you from doing so than, i accept that but if not i would appriciate it if you could help me
0
 
LVL 5

Accepted Solution

by:
Droby10 earned 50 total points
ID: 10748031
for starters i'd go with dce/rpc over smb by luke kenneth casson leighton.  then i'd move into modelling and analysis of security protocols by ryan and schneider.   then i'd look at com and atl 3.0 from troelsen which does a pretty good job of describing the rpc and lrpc.  you might find power programming with rpc by bloomer to be pretty information and if you can locate a copy of nfs illustrated by callaghan, then the framework of xdr to onc rpc is layed out beautifully.

enjoy.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question