Null session
From HandWiki
A null session is an anonymous connection to an inter-process communication network service on Windows-based computers.[1] The service is designed to allow named pipe connections[2] but may be used by attackers to remotely gather information about the system.[3]
Exposure
From a NULL session, hackers can call APIs and use Remote Procedure calls to enumerate information. These techniques can, and will provide information on passwords, groups, services, users and even active processors. NULL session access can also even be used for escalating privileges and perform DoS attacks.—Ixis Research LTD[4]
References
- ↑ "Null Session Attacks and How to Avoid Them". http://www.dummies.com/how-to/content/null-session-attacks-and-how-to-avoid-them.html. Retrieved 2016-01-05.
- ↑ "IPC$ share and null session behavior in Windows". Microsoft. https://support.microsoft.com/en-us/kb/3034016. Retrieved 2016-01-05.
- ↑ "The Anatomy of a Attack". http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/Anatomy-Nul-Attack.html. Retrieved 2016-01-05.
- ↑ "How is information enumerated through NULL session access, Remote Procedure Calls and IPC$?". Ixis Research LTD. http://www.softheap.com/security/session-access.html. Retrieved 24 February 2013.
Original source: https://en.wikipedia.org/wiki/Null session.
Read more |