19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 11-6:<br />

Mapping<br />

a null session<br />

to a<br />

vulnerable<br />

Windows<br />

system.<br />

Chapter 11: Windows<br />

Although later versions of Windows are much more secure than their predecessors,<br />

don’t assume that all’s well in Windows-land. I can’t tell you how<br />

many times I see supposedly secure Windows installations “tweaked” to<br />

accommodate an application or other business need that happens to facilitate<br />

exploitation.<br />

Mapping<br />

Follow these steps for each Windows computer to which you want to map a<br />

null session:<br />

1. Format the basic net command, like this:<br />

net use \\host_name_or_IP_address\ipc$ “” “/user:”<br />

The net command to map null sessions requires these parameters:<br />

• net (the built-in Windows network command) followed by the use<br />

command<br />

• The IP address or hostname of the system to which you want to<br />

map a null connection<br />

• A blank password and username<br />

The blanks are why it’s called a null connection.<br />

2. Press Enter to make the connection.<br />

Figure 11-6 shows an example of the complete command when mapping<br />

a null session. After you map the null session, you should see the message<br />

The command completed successfully.<br />

To confirm that the sessions are mapped, enter this command at the command<br />

prompt:<br />

net use<br />

As shown in Figure 11-6, you should see the mappings to the IPC$ share on<br />

each computer to which you’re connected.<br />

209

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!