Security of "invisible sharing" in LAN

Source: Internet
Author: User

Some friends may not know much about invisible sharing. Those who have used Windows NT must know that by default, all logical partitions on the hard disk are set to share, however, you cannot see these shared partitions through network neighbors. to access these invisible partitions, you must use the UNC path,
That is, Type \ computer name \ shared name in the address bar or map it to the local hard disk using a ing network drive.

Figure 1
Figure 1 blur the searched files for security reasons
In fact, this "Invisibility" is achieved by adding "" after the shared name. Due to the appearance of some scanning network sharing tools, it brings a great deal of security to shared friends, therefore, it is recommended that you add the dollar sign "" after the shared name to hide the shared drive (folder. That's right! Setting invisible sharing ensures the security of shared resources to a certain extent, but this is not absolute, the example given by the author below is to remind those who have not yet known the risks of sharing.
First copy "Msnp32.dll" under the "Windows (98)/System" directory to another folder, run the Ultraedit-32, open the file you just saved, search for "24 56 xx" hexadecimal bytes, replace "24" with "00", save and exit. Because Msnp32.dll is a System file, we cannot directly overwrite it in Windows. restart the System to enter the DOS Status and then merge the modified Msnp32.dll to the System directory.
Figure 2 exposed invisible shared files
Now let's take a look at the role of modifying Msnp32.dll. Run Nethacker (Network assassin, a popular tool for scanning and sharing on the internet). Select "Search for shared hosts" from the "host resources" menu and enter the IP segment to be searched for scanning. In a short time, we can see the shared resources (1) in the "Internet" list. There is actually a fully shared C drive, that is, no password is set, it does not hide it. It seems that the security awareness of many netizens is still relatively weak. Next, I found a shared folder with "" invisible behind the two Identifiers (of course, one of which is used for experiment). Now that there is another one, let's take a look, "map it to a network drive", then open "my computer" and double-click to enter the ing drive, the content inside is unobstructed (2 ). Now you know the danger of sharing. Fortunately, this guy is smart. He didn't use this method to open the sharing of drive C. Otherwise, this machine belongs to me!
The purpose of this example is not to teach you how to destroy, but to improve your security awareness. If it is not necessary, it is best not to set up network sharing, or simply cancel the "Network Neighbor" service. Even if it is required, in addition to adding the necessary invisible symbols, it is best to select "read-only" for "access type". If you set a password for access, make sure that the password is relatively complex and has enough length. Remind you that there is a vulnerability in Windows 95/98 shared directory password verification. You can use the modified "Vredir. vxd" Driver file to verify the password to only the first byte and then crack it.

Related Articles]

  • New security law, invisible LAN files

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.