Turn off your SMTP, Telnet and HTTP banners

Find out how to turn off your SMTP, Telnet and HTTP banners.

This tip was submitted to the SearchWin2000.com tip exchange by member Mark Mills. Please let other users know how useful it is by rating it below.

When you Telnet to your mail server (port 25) from a command line, (c:telnet 25), it displays what SMTP server you are running. The same goes for Telnet(23) and HTTP(80) ports. This leads to an "OS Fingerprint" so hackers can decide on what vulnerabilities you have to attack. What can you do to block this in Windows 2000? Use the Meta Editor provided free of charge from Microsoft. For more information see <A HREF=http://www.iisfaq.com/?View=A385&P=109>http://www.iisfaq.com/?View=A385&P=109</A> and download the editor at <A HREF=http://support.microsoft.com/support/kb/articles/Q232/0/68.ASP>http://support.microsoft.com/support/kb/articles/Q232/0/68.ASP</A>. <P>This editor works for the SMTP service bundled with Windows 2000 server and for Exchange. For Windows 2003 people, change the default connection response that you receive after you connect to the SMTP port in Exchange 2003. For more information see: <A HREF=http://support.microsoft.com/?id=836564>http://support.microsoft.com/?id=836564</A>. <P>For Telnet banners: Change the Telnet Server Banner and Run Programs for All Users. See Microsoft Knowledge Base <A HREF=http://support.microsoft.com/default.aspx?scid=kb;en-us;245095&Product=win2000>Article 245095</A> for more information. <P>For HTTP banners -- sorry I couldn't find a free way to do this – try <A HREF=http://www.port80software.com/products/servermask/>http://www.port80software.com/products/servermask/</A>. <P>This way you won't be telling the hackers what type of Microsoft OS/application your running. If you've never heard about OS fingerprinting and what can become of it, read this abstract at: <A HREF=http://www.insecure.org/nmap/nmap-fingerprinting-article.html>http://www.insecure.org/nmap/nmap-fingerprinting-article.html</A>. <BR></body></html>

This was first published in June 2004

Dig deeper on Windows Server Consolidation Strategies



Enjoy the benefits of Pro+ membership, learn more and join.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: