lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <acdc033d050817145410e69687@mail.gmail.com>
Date: Wed Aug 17 22:55:05 2005
From: michealespinola at gmail.com (Micheal Espinola Jr)
Subject: Re: It's not that simple...

Surely.  Disabling Null Sessions is recommended security practice.  I
have been doing it for at least 10 years now.

I think I first wrote about it in "The Hardening of Windows NT", which
IIRC, was in 1995.

On 8/17/05, Kurt Seifried <listuser@...fried.org> wrote:
> Actually it really is that simple. Disabling Null sessions is entirely
> possible, quite easy, and doesn't break a lot (at least in my previous
> testing years ago it didn't break anything noticeable).

[snip]

> -Kurt Seifried
> http://seifried.org/freescan2/
> https://lists.seifried.org/mailman/listinfo/security

-- 
ME2  <http://www.santeriasys.net/>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ