Null session
{{Orphan|date=July 2020}}
A null session is an anonymous connection to an inter-process communication network service on Windows-based computers.{{cite web |url=http://www.dummies.com/how-to/content/null-session-attacks-and-how-to-avoid-them.html |title=Null Session Attacks and How to Avoid Them |accessdate=2016-01-05}} The service is designed to allow named pipe connections{{cite web |url=https://support.microsoft.com/en-us/kb/3034016 |title=IPC$ share and null session behavior in Windows |publisher=Microsoft |accessdate=2016-01-05}} but may be used by attackers to remotely gather information about the system.{{cite web |url=http://www.windowsecurity.com/articles-tutorials/authentication_and_encryption/Anatomy-Nul-Attack.html |title=The Anatomy of a Attack |accessdate=2016-01-05}}
Exposure
{{Blockquote|text=From a NULL session, hackers can call APIs and use Remote Procedure calls to enumerate information. These techniques can, and will provide information on passwords, groups, services, users and even active processors. NULL session access can also even be used for escalating privileges and perform DoS attacks.|sign=Ixis Research LTD{{cite web|title=How is information enumerated through NULL session access, Remote Procedure Calls and IPC$?|url=http://www.softheap.com/security/session-access.html|publisher=Ixis Research LTD|accessdate=24 February 2013|archive-url=https://web.archive.org/web/20160208020238/http://www.softheap.com/security/session-access.html|archive-date=8 February 2016|url-status=dead}}}}
References
{{reflist}}
Category:Hacking (computer security)
Category:Computer security exploits
{{Compu-network-stub}}