This tip was submitted to the SearchWin2000.com tip exchange by member Mark Mills. Please let other users know...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
how useful it is by rating it below.
When you Telnet to your mail server (port 25) from a command line, (c:telnet
25), it displays what SMTP server you are running. The same goes for Telnet(23) and HTTP(80) ports. This leads to an "OS Fingerprint" so hackers can decide on what vulnerabilities you have to attack. What can you do to block this in Windows 2000? Use the Meta Editor provided free of charge from Microsoft. For more information see <A HREF=http://www.iisfaq.com/?View=A385&P=109>http://www.iisfaq.com/?View=A385&P=109</A> and download the editor at <A HREF=http://support.microsoft.com/support/kb/articles/Q232/0/68.ASP>http://support.microsoft.com/support/kb/articles/Q232/0/68.ASP</A>. <P>This editor works for the SMTP service bundled with Windows 2000 server and for Exchange. For Windows 2003 people, change the default connection response that you receive after you connect to the SMTP port in Exchange 2003. For more information see: <A HREF=http://support.microsoft.com/?id=836564>http://support.microsoft.com/?id=836564</A>. <P>For Telnet banners: Change the Telnet Server Banner and Run Programs for All Users. See Microsoft Knowledge Base <A HREF=http://support.microsoft.com/default.aspx?scid=kb;en-us;245095&Product=win2000>Article 245095</A> for more information. <P>For HTTP banners -- sorry I couldn't find a free way to do this – try <A HREF=http://www.port80software.com/products/servermask/>http://www.port80software.com/products/servermask/</A>. <P>This way you won't be telling the hackers what type of Microsoft OS/application your running. If you've never heard about OS fingerprinting and what can become of it, read this abstract at: <A HREF=http://www.insecure.org/nmap/nmap-fingerprinting-article.html>http://www.insecure.org/nmap/nmap-fingerprinting-article.html</A>. <BR></body></html>