Insecure Service
SMB Service Availability to Internet or Other Unauthorized Users
TCM-KB-EXT-001
Last Updated: 6/26/2023
Microsoft Windows Server
The recommended remediation steps and configurations described in this response would primarily affect systems running Microsoft Windows Server.
SMB
SMB refers to Server Message Block.
A small message block refers to a compact unit of data transmission used in communication protocols. It typically contains a limited amount of information, such as a command, status update, or a small portion of a larger message, allowing for efficient and rapid exchange of data between devices or systems.
Contributor
Joe Helle
Chief Hacking Officer
Recent Blogs
SMB Relay Attacks and How to Prevent Them in Active Directory
0. OverviewMany organizational networks rely on Active Directory (AD) to streamline administrative tasks and enhance efficiency. However, some of its default configurations are vulnerable to attackers. The SMB (Server Message Block) protocols stand out as particularly...
Three Ways to Write More Secure Code
Three practices to bolster app security: treat every user as a threat, use static code analysis tools, and consider your tech stack.
Unearthing Secrets in Git Logs
Overview Version control systems, such as Git, are essential tools in software development, enabling seamless collaboration and change tracking. However, their widespread use can sometimes lead to unintended security oversights. While Git excels in managing code...
Cybersecurity Careers: Certifications vs. Learning Paths
Navigate your cybersecurity career: Dive into the merits of certifications vs. learning paths, and discover the most effective route to expertise.
Projects to Land Your First Cybersecurity Job
Gaining experience in cybersecurity before landing a job can be tricky. However, side projects are an excellent way to gain experience and impress recruiters.
Issue
The SMB service on the domain-joined endpoint is available to the Internet. This could permit information disclosure of internal network identities (i.e., fully-qualified domain names of internal domains) and accessibility of an external entry point for brute force attacks.
Recommended Remediation
The following outlines the recommended steps that the systems and network administrators should take in order to secure the environment.
Utilizing a user account with administrative privileges, open Windows Defender Firewall with Advanced Security.
Right-click inbound Rules and select New Rule.
In the Rule Type window, click Port and select next.
Select the TCP option, and below, the Specific local ports option. Enter ports 135, 139, 445 and click Next.
On the next screen, select Block the connection and press Next.
In the next window, deselect Domain and Private, and select Public. If you prefer to only allow domain-connected devices to access the SMB service, deselect only Domain, and select Private and Public. Press Next when complete.
In the next window, specify a name for the new firewall rule, and enter a description if desired. Press Finish when complete.
Sample Pentest Report
See The Results We Can Deliver To You. No Email Required.
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.