TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: Geo.
from: Chris Robinson
date: 2003-07-01 09:07:14
subject: Re: Batch File Question

From: Chris Robinson 

Ah right.  Thanks for the info.

Chris.

"Geo." wrote:

> It would most likely do that if it were a mapped share, with just a share on
> some machine on the network a lot of the virus won't even know it's there
> let alone try using the current login on it (usually the ones that search
> empty space assume they are searching the internet).
>
> Geo.
>
> "Chris Robinson" 
wrote in message
> news:3F0062BF.92FB3FA0{at}NOSPAMtotalise.co.uk...
> > Yeh, I'll add some of these things I think - thanks.  Surely though, a
> virus that
> > propogated via network shares would go to a PC even if the Guest account
> was
> > dissabled.  If the PC that sends it the virus is logged onto our network
> then
> > that PC has full access to this share - so it would write to it...
> wouldn't it?
> >
> > Chris.
> >
> > John Beckett wrote:
> >
> > > Chris Robinson  wrote
in message
> > > news::
> > > >  I just wanted to set something up with an open share
so I know if
> anything
> > > > like this happens again.
> > >
> > > Yes, but on NT4, if you don't enable Guest with a blank password, then
> if
> > > there is a network-share-probing virus, your honeypot will
probably NOT
> > > detect it. These kinds of viruses are pretty primitive so
far. They are
> > > looking for shares that can be written by an anonymous
(Guest) user, or
> by
> > > Administrator with one of a limited number of guessed passwords (e.g.
> > > "admin" or "password").
> > >
> > > Probably a more scientific approach would be to run Snort
(which detects
> > > any suspicious network activity), or enable auditing on your
NT machine.
> > > Log failed logon attempts and failed write attempts to the shared
> folder.
> > >
> > > Attempts to access the share with an unknown user or
incorrect password
> > > would appear in the Security log of Event Viewer.
> > >
> > > John
> >

--- BBBS/NT v4.01 Flag-4
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.