IPC$ question
Does it serve any other uses? I noted earlier today that it opened twice on my machine without me doing anything. I'm just wondering if that's normal. I closed it both times and checked to see if anyone was trying to access my machine, but with so many packets floating about this busy network it was hard to tell.
KG
KG
Present goals: MCAS, MCSA, 70-680
Comments
-
seuss_ssues Member Posts: 629If your concerned here is an article discussing the removal of the IPC.
http://support.microsoft.com/?id=314984 -
JDMurray Admin Posts: 13,091 AdminThe IPC$ hidden share is used by the Windows named pipes interprocess communications mechanism. It is created and removed as needed.
-
KGhaleon Member Posts: 1,346 ■■■■□□□□□□Ok, I just figured it was abnormal. If it's a normal windows event, then I'll just leave it alone. If it comes to it, I'll just see if I can disable it. I didn't see anything in that link about disabling an existing share.
KGPresent goals: MCAS, MCSA, 70-680 -
sexion8 Member Posts: 242open a DoS prompt and type IPC$ /delete if you have a null session you want to remove. To stop WindozeXP from IPC sharing: Regedit: HKLM/System/CurrentControlSet/Control/LSA/RestrictAnonymous=2 then reboot. Block out ports 135, 137-139 (udp&&tcp), 445 (tcp). On reboot open a prompt and type: net view \\you.rip.add.res You should be fine. Before you even do this though, if this machine is behind a router or fw, you may want to try to remotely connect to your machine to see if you can find shares... Chances are you won't be able to... Xlation, you have little to worry about unless your internal network is a war zone"Everything we hear is an opinion, not a fact. Everything we see is a perspective, not the truth." - Marcus Aurelius
-
Philippatos Inactive Imported Users Posts: 45 ■■□□□□□□□□Yeah that MS article is just plain wrong. In NT 4.0 you *COULD* delete IPC$ directly, but not in XP. I used to use that trick AFTER loging into the domain to prevent domain admins from being able to administer my workstation. If they tried to connect they'd get an "access denied" message. I could still access all network resources though, so didn't hinder my work at all.
In the context of C|EH though IPC$ is for establishing null sessions used by hackers for enumeration.
http://www.windowsecurity.com/whitepaper/Windows-Enumeration-USER2SID-SID2USER.html
PS: It's also the reason why renaming the administrator account is a useless "best practice". Should just call it a "useless practice", but someone decided it's best, so must be. -
keatron Member Posts: 1,213 ■■■■■■□□□□Philippatos wrote:Yeah that MS article is just plain wrong. In NT 4.0 you *COULD* delete IPC$ directly, but not in XP. I used to use that trick AFTER loging into the domain to prevent domain admins from being able to administer my workstation. If they tried to connect they'd get an "access denied" message. I could still access all network resources though, so didn't hinder my work at all.
In the context of C|EH though IPC$ is for establishing null sessions used by hackers for enumeration.
http://www.windowsecurity.com/whitepaper/Windows-Enumeration-USER2SID-SID2USER.html
PS: It's also the reason why renaming the administrator account is a useless "best practice". Should just call it a "useless practice", but someone decided it's best, so must be.
I wouldn't call renaming the administrator account totally "useless". You should view it as one of the many practices that makes the "layers" of security that much "thicker". While it's a fact that the SID is going to give away an administrator account every time, you'd be surprised how many script kiddies there are who don't even know what a SID looks like or where to find it. Saying it's useless is just like saying "I won't lock my car doors because if a car jacker wants it, he will just break a window and steal my car". -
Philippatos Inactive Imported Users Posts: 45 ■■□□□□□□□□You're entitled to your opinion. Saying something is "best" doesn't make it so, however, regardless of whatever authority you think you carry on the topic.
The fact remains changing the administrator account name secures nothing, unlike a lock. You can also change the root account name in *NIX. Nobody does it for the same reason, root's ID would still be the same (in this case zero not 500). -
Philippatos Inactive Imported Users Posts: 45 ■■□□□□□□□□Just in case someone is thinking "well, then how do you secure the administrator account?" The answer is create a strong password. That's all there is to it.
http://en.wikipedia.org/wiki/Strong_password
And for maximum security use a random password generator, like:
http://www.liebsoft.com/index.cfm/products/rpmee -
keatron Member Posts: 1,213 ■■■■■■□□□□Philippatos wrote:You're entitled to your opinion. Saying something is "best" doesn't make it so,)Philippatos wrote:however, regardless of whatever authority you think you carry on the topic.
My wife has done a good job of teaching me that I'm not an authority on anything nor do I have authority over anything. She knows everything, and has authority over everything I touch. So you'd better play nice before I sic her on you dude!!!!!Philippatos wrote:The fact remains changing the administrator account name secures nothing, unlike a lock. You can also change the root account name in *NIX. Nobody does it for the same reason, root's ID would still be the same (in this case zero not 500). -
keatron Member Posts: 1,213 ■■■■■■□□□□Philippatos wrote:Just in case someone is thinking "well, then how do you secure the administrator account?" The answer is create a strong password. That's all there is to it.
http://en.wikipedia.org/wiki/Strong_password
And for maximum security use a random password generator, like:
http://www.liebsoft.com/index.cfm/products/rpmee
For maximum security you'd use three factor authentication, not single factor (password). -
sprkymrk Member Posts: 4,884 ■■■□□□□□□□keatron wrote:Philippatos wrote:Just in case someone is thinking "well, then how do you secure the administrator account?" The answer is create a strong password. That's all there is to it.
http://en.wikipedia.org/wiki/Strong_password
And for maximum security use a random password generator, like:
http://www.liebsoft.com/index.cfm/products/rpmee
For maximum security you'd use three factor authentication, not single factor (password).
Agreed keatron. In addition, in many environments there is no "real" need for a local admin account anyway. Disable it. Set a strong, random password. Require a Smart Card to log into the workstation. Set the "deny log on locally" for the local admin account.
Phil - you, of all people should know, creating a strong password is NOT "all there is to it". I am sure your C|EH training taught about linux boot disks...All things are possible, only believe. -
keatron Member Posts: 1,213 ■■■■■■□□□□sprkymrk wrote:keatron wrote:Philippatos wrote:Just in case someone is thinking "well, then how do you secure the administrator account?" The answer is create a strong password. That's all there is to it.
http://en.wikipedia.org/wiki/Strong_password
And for maximum security use a random password generator, like:
http://www.liebsoft.com/index.cfm/products/rpmee
For maximum security you'd use three factor authentication, not single factor (password).
Agreed keatron. In addition, in many environments there is no "real" need for a local admin account anyway. Disable it. Set a strong, random password. Require a Smart Card to log into the workstation. Set the "deny log on locally" for the local admin account.
Phil - you, of all people should know, creating a strong password is NOT "all there is to it". I am sure your C|EH training taught about linux boot disks...
Yep, more specifically you should have learned about it in Module 5 when you took the course. As a matter of fact, you should have been instructed on how to use this exact tool. http://home.eunet.no/pnordahl/ntpasswd/ -
KGhaleon Member Posts: 1,346 ■■■■□□□□□□Good information to know. I was actually just using net use * /d /y to end the IPC$ connections, since I don't have shares on this particular laptop that I use.
KGPresent goals: MCAS, MCSA, 70-680