shanek said:
No, it goes by programs. As long as you haven't told the program to run as a server, that port is blocked. Allowing a program to run as a server opens whatever port(s) that program needs.
It goes by both, actually. You set up a "Trusted Network" via IP numbers, either a range or a single IP number.
[
But that's not NetBIOS; that's file and print sharing.
Some hacking 101:
NetBIOS is set up on ports 137 (name) and 139 (session). I did mention port 135 in an earlier post, this was incorrect.
If port 139 is open (ie, you've set up your network as a "trusted network" ) then you can set up a null session. This null session can be used to gather a wealth of information.
If port 137 is accessible then you can enumerate the netbios rather easily using the net view command.
So...if you're on a network that is listed as "trusted" (by gaining access to a wireless router with default passwords, for instance) you can find out a machine name without any special hacking tools. And if it's a Windows 2000 machine that has been set up so that the machine Administrator account (not the domain Administrator account...two different things there) doesn't have a password all the hacker has to do from his machine is run the command
\\machinename\c$
And input Administrator as the name, with no password....and s/he has access to your C$ drive. To the point where they can put a nic elittle message on your desktop.
On Windows 2000 it's pretty easy to set up a defense against this, but most folks don't even know it's a problem. You can set "Restrict Anonymous", but if it's set too high then you run into 3rd party connectivity problems, or major connection problems if you're in a mixed environment (see Microsoft areticle Q143474, or read the RFC's 1001 and 1002 for more details).
Honestly, I think we're both saying much the same thing. My point is that setting up a personal firewall on an internal network is going to cause problems; chances are good your System Administrators are going to be pretty ticked off if you add one & it's not set up correctly. If you set it up so that your network is a trusted network, and someone gets into your network, it won't do you much good.
The major problem here is that a System Administrator added a wireless network with esssentially zero protection. Any firewalls or protections they had were useless, and immediately compromised. Adding a personal firewall may have helped, but it would have had to have been set up in such a way that it allowed Windows communication with systems that were "known", and rejected those that were "unknown".
A strong password, and Restrict Anonymous would have done this far more effectively than a personal firewall.