Hi Security nuts!,
Ok so, you guys can earn your salt with me today if you have suggestions

. The homies from IBM security division are giving me **** again this week. They have completed a PEN test this week again for my customer. They seem to think that we havent actually fixed an underlying issue with the good ole windows NULL sessions security entailments that have been going on for years.
They claim, that SMB can leak operating system information over port TCP 445 (or I am guessing over 139 as well if NETBT is on right?).
First of all, they suggest the Fix is the good old "RestrictAnonymous" registry change. This is fine, but this still does not stop anonymous connections to the server.
They then go on to mention changing the "TransportBindName" reg info to block access to port 445 on the server.
My question is (because they don't reveal it), how are IBM doing their OS profiling using SMB/NBTSTAT or whatever they are using when they have an anonymous connection with their servers?
If you can help me out, it's rep, e-cookies and a beer if ever in Central London

Cheers,
Pash