?
Solved

closing ports 135 (msrpc) & 139 (netbios-ssn)

Posted on 2004-10-02
6
Medium Priority
?
5,194 Views
Last Modified: 2013-12-04
According to nmap, the following ports are open on my computer:

135/tcp  open     msrpc
139/tcp  open     netbios-ssn


My understanding is the msrpc is the server that formerly was vulnerable to the msblast worm, so I'd like to disable it. I probalby don't need it open, right? How can this be done?

Also, is there a reason not to disable the netbios-ssn process? If so, how can I stop the process from running?

Thanks.
0
Comment
Question by:bobwood2000
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 2

Expert Comment

by:dev8
ID: 12210155
You can prevent these ports from being exploited by simply running a firewall such as Zone Alarm (http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp).  They will block any TCP port 135/139 traffic.  
0
 

Author Comment

by:bobwood2000
ID: 12210681
I don't want to use a firewall.
0
 

Expert Comment

by:sosor
ID: 12213417
Try disabling the file & Printer sharing
0
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

 

Author Comment

by:bobwood2000
ID: 12214979
I disabled file & printer sharing, but the ports remain open.
0
 
LVL 2

Accepted Solution

by:
dev8 earned 1000 total points
ID: 12217378
0
 

Author Comment

by:bobwood2000
ID: 12218064
Thank you.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
Suggested Courses
Course of the Month12 days, 5 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question