SlideShare une entreprise Scribd logo
Windows Firewall Page 1
Security Instructions to close down unused laptop ports
Written by: Dave Sweigert, CISSP, CISA, PMP
ABSTRACT: Laptop users (road warriors) that are not usually operating within a local area
network infrastructure behind a firewall may have certain communications ports enabled that
place them at greater risk in public WiFi (wireless access) points.
INTRODUCTION: This white paper will provide instructions on how to disable
communications Ports 135 and 445 on a laptop used in a public wireless environment. Users
should disable one port at a time, monitor the operation of their business critical applications,
then enable another port after the observation period.. Again, monitor behavior then proceed.
These instructions assume use of Windows 7.
METHODS:
Step One:
Locate System Security tab from Control Panel by pressing the Microsoft Windows logo in the
lower left area of your desktop.
Windows Firewall Page 2
Step Two:
Locate the FIREWALL capability.
Step Three:
Click Advanced Settings
Windows Firewall Page 3
Step Four:
Click INBOUND RULES on the left tool bar and observe NEW RULE in the right hand tool
bar.
Step Five:
Click NEW RULE then observe a new dialogue box, click PORT.
Windows Firewall Page 4
Step Six:
Enter NEXT then observe SPECIFIED LOCAL PORTS; enter 135 then NEXT
DISCUSSION:
Well known malware Root kits can use port 135 to transmit data back to home base and
download more malware. An attacker who can access TCP or ports 135, 139 or 445 could
execute arbitrary code with Local System privileges. This allows the attacker to gain complete
control over the exploited system.
On systems protected by an infrastructure firewall, it is a standard practice to block these ports
due to the known associated risks.
Windows Firewall Page 5
Windows Firewall Page 6
Step Seven:
Select BLOCK the connection and enter NEXT.
Windows Firewall Page 7
Step Eight:
Leave all check marks in-place and proceed with NEXT.
Windows Firewall Page 8
Step Nine:
Apply a suitable name to this rule; such as “Block Inbound Port 135”.
Windows Firewall Page 9
Step Ten:
Observe the new rule.
Repeat the same process for OUTBOUND Port 135. After a positive observation period, repeat
for Port 445 (notice OUTBOUND RULES below).
RESULTS: Inbound and Outbound attempts to use these ports will be disabled. In sum, these
ports are considered unnecessary in a WiFi public setting and are considered another gateway for
malicious software and hacker activities.

Contenu connexe

Tendances

Stuxnet - More then a virus.
Stuxnet - More then a virus.Stuxnet - More then a virus.
Stuxnet - More then a virus.
Hardeep Bhurji
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
Byres Security Inc.
 
Stuxnet
StuxnetStuxnet
Stuxnet
Symantec
 
RCCreator Guidance. Remote control adding (copy codes from your original remo...
RCCreator Guidance. Remote control adding (copy codes from your original remo...RCCreator Guidance. Remote control adding (copy codes from your original remo...
RCCreator Guidance. Remote control adding (copy codes from your original remo...
Lidiia Nesterenko
 
Interrupts
InterruptsInterrupts
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
Gil Megidish
 
Interrupts
InterruptsInterrupts
Interrupts
Albin Panakkal
 
Coa INTERUPT
Coa INTERUPTCoa INTERUPT
Coa INTERUPT
Piyush Rochwani
 
How Printers Get Hacked ?
How Printers Get Hacked ?How Printers Get Hacked ?
How Printers Get Hacked ?
HusseinMuhaisen
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
Ajinkya Nikam
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
Sandeep Yadav
 
Backdoor
BackdoorBackdoor
Backdoor
phanleson
 
Uzair ppt
Uzair pptUzair ppt
Uzair ppt
princejhulan
 
Mbs f41 b
Mbs f41 bMbs f41 b
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case Study
Amr Thabet
 

Tendances (15)

Stuxnet - More then a virus.
Stuxnet - More then a virus.Stuxnet - More then a virus.
Stuxnet - More then a virus.
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
RCCreator Guidance. Remote control adding (copy codes from your original remo...
RCCreator Guidance. Remote control adding (copy codes from your original remo...RCCreator Guidance. Remote control adding (copy codes from your original remo...
RCCreator Guidance. Remote control adding (copy codes from your original remo...
 
Interrupts
InterruptsInterrupts
Interrupts
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
Interrupts
InterruptsInterrupts
Interrupts
 
Coa INTERUPT
Coa INTERUPTCoa INTERUPT
Coa INTERUPT
 
How Printers Get Hacked ?
How Printers Get Hacked ?How Printers Get Hacked ?
How Printers Get Hacked ?
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
Firewall basics
Firewall basicsFirewall basics
Firewall basics
 
Backdoor
BackdoorBackdoor
Backdoor
 
Uzair ppt
Uzair pptUzair ppt
Uzair ppt
 
Mbs f41 b
Mbs f41 bMbs f41 b
Mbs f41 b
 
Stuxnet - Case Study
Stuxnet  - Case StudyStuxnet  - Case Study
Stuxnet - Case Study
 

En vedette

Brand ability
Brand abilityBrand ability
Brand ability
sonat antepli
 
LCM slides_25th May 2014_AIESEC LC ANFA
LCM slides_25th May 2014_AIESEC LC ANFALCM slides_25th May 2014_AIESEC LC ANFA
LCM slides_25th May 2014_AIESEC LC ANFA
aiesec_anfa
 
İletişim ve ilişki yönetimi eğitimi
İletişim ve ilişki yönetimi eğitimiİletişim ve ilişki yönetimi eğitimi
İletişim ve ilişki yönetimi eğitimi
Başak Tecer Eğitim ve Danışmanlık Şirketi
 
Catálogo HED 2011
Catálogo HED 2011Catálogo HED 2011
Catálogo HED 2011
speedinc
 
Ak genkurul haziran 2012
Ak genkurul haziran 2012Ak genkurul haziran 2012
Ak genkurul haziran 2012Harvy Jackson
 
Textil laboral y calzado de seguridad J'HAYBER WORKS - 2013
Textil laboral y calzado de seguridad J'HAYBER WORKS - 2013Textil laboral y calzado de seguridad J'HAYBER WORKS - 2013
Textil laboral y calzado de seguridad J'HAYBER WORKS - 2013
Suministros Herco
 
Estat de l’art del digital signage i l'outdoor broadcasting
Estat de l’art del digital signage i l'outdoor broadcastingEstat de l’art del digital signage i l'outdoor broadcasting
Estat de l’art del digital signage i l'outdoor broadcasting
CREA CCMA
 
Tutorial on Using Amazon Mechanical Turk (MTurk) for HCI Research
Tutorial on Using Amazon Mechanical Turk (MTurk) for HCI ResearchTutorial on Using Amazon Mechanical Turk (MTurk) for HCI Research
Tutorial on Using Amazon Mechanical Turk (MTurk) for HCI Research
Ed Chi
 
Mutlusan 2015 Fiyat Listesi
Mutlusan 2015 Fiyat ListesiMutlusan 2015 Fiyat Listesi
Mutlusan 2015 Fiyat Listesi
Berh Elektromekanik Otomasyon
 
Tablas
Tablas Tablas
Haziran - İletisim Trendleri Raporu
Haziran - İletisim Trendleri RaporuHaziran - İletisim Trendleri Raporu
Haziran - İletisim Trendleri Raporu
Begüm Akın
 
Reception booklet of_turkey
Reception booklet of_turkeyReception booklet of_turkey
Reception booklet of_turkey
mmfizmir
 
Html
HtmlHtml
Html
apedron
 
Historical Perspective of the Cooperative Movement
Historical Perspective of the Cooperative MovementHistorical Perspective of the Cooperative Movement
Historical Perspective of the Cooperative Movement
Jo Balucanag - Bitonio
 
3) Ar Ge Ve Yenilik GöStergeleri
3) Ar Ge Ve Yenilik GöStergeleri3) Ar Ge Ve Yenilik GöStergeleri
3) Ar Ge Ve Yenilik GöStergeleriserhatcakir
 
Zorbalık
ZorbalıkZorbalık
Zorbalık
Yanki Yazgan
 
Bedenin Egitimi ve Farkindalik - İslam ve Spor
Bedenin Egitimi ve Farkindalik - İslam ve SporBedenin Egitimi ve Farkindalik - İslam ve Spor
Bedenin Egitimi ve Farkindalik - İslam ve Spor
Salih Özüduruk
 
Tr tesorería
Tr   tesoreríaTr   tesorería
Tr tesorería
ricardopabloasensio
 

En vedette (20)

Brand ability
Brand abilityBrand ability
Brand ability
 
LCM slides_25th May 2014_AIESEC LC ANFA
LCM slides_25th May 2014_AIESEC LC ANFALCM slides_25th May 2014_AIESEC LC ANFA
LCM slides_25th May 2014_AIESEC LC ANFA
 
İletişim ve ilişki yönetimi eğitimi
İletişim ve ilişki yönetimi eğitimiİletişim ve ilişki yönetimi eğitimi
İletişim ve ilişki yönetimi eğitimi
 
Catálogo HED 2011
Catálogo HED 2011Catálogo HED 2011
Catálogo HED 2011
 
Ak genkurul haziran 2012
Ak genkurul haziran 2012Ak genkurul haziran 2012
Ak genkurul haziran 2012
 
Textil laboral y calzado de seguridad J'HAYBER WORKS - 2013
Textil laboral y calzado de seguridad J'HAYBER WORKS - 2013Textil laboral y calzado de seguridad J'HAYBER WORKS - 2013
Textil laboral y calzado de seguridad J'HAYBER WORKS - 2013
 
Estat de l’art del digital signage i l'outdoor broadcasting
Estat de l’art del digital signage i l'outdoor broadcastingEstat de l’art del digital signage i l'outdoor broadcasting
Estat de l’art del digital signage i l'outdoor broadcasting
 
Atasozleri A01
Atasozleri A01Atasozleri A01
Atasozleri A01
 
Trakya tr
Trakya trTrakya tr
Trakya tr
 
Tutorial on Using Amazon Mechanical Turk (MTurk) for HCI Research
Tutorial on Using Amazon Mechanical Turk (MTurk) for HCI ResearchTutorial on Using Amazon Mechanical Turk (MTurk) for HCI Research
Tutorial on Using Amazon Mechanical Turk (MTurk) for HCI Research
 
Mutlusan 2015 Fiyat Listesi
Mutlusan 2015 Fiyat ListesiMutlusan 2015 Fiyat Listesi
Mutlusan 2015 Fiyat Listesi
 
Tablas
Tablas Tablas
Tablas
 
Haziran - İletisim Trendleri Raporu
Haziran - İletisim Trendleri RaporuHaziran - İletisim Trendleri Raporu
Haziran - İletisim Trendleri Raporu
 
Reception booklet of_turkey
Reception booklet of_turkeyReception booklet of_turkey
Reception booklet of_turkey
 
Html
HtmlHtml
Html
 
Historical Perspective of the Cooperative Movement
Historical Perspective of the Cooperative MovementHistorical Perspective of the Cooperative Movement
Historical Perspective of the Cooperative Movement
 
3) Ar Ge Ve Yenilik GöStergeleri
3) Ar Ge Ve Yenilik GöStergeleri3) Ar Ge Ve Yenilik GöStergeleri
3) Ar Ge Ve Yenilik GöStergeleri
 
Zorbalık
ZorbalıkZorbalık
Zorbalık
 
Bedenin Egitimi ve Farkindalik - İslam ve Spor
Bedenin Egitimi ve Farkindalik - İslam ve SporBedenin Egitimi ve Farkindalik - İslam ve Spor
Bedenin Egitimi ve Farkindalik - İslam ve Spor
 
Tr tesorería
Tr   tesoreríaTr   tesorería
Tr tesorería
 

Similaire à Disabling Ports 135 and 445 to protect the Road Warrior

Sec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brownSec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brown
JoshuaBrown233
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
Droidcon Berlin
 
FTTx GPON System Troubleshooting.pptx
FTTx GPON System Troubleshooting.pptxFTTx GPON System Troubleshooting.pptx
FTTx GPON System Troubleshooting.pptx
TedevTu
 
Zoom user manual
Zoom user manualZoom user manual
Zoom user manual
Safiah Sulaiman
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
EC-Council
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
Taishaun Owens
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
devidas shinde
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
shivendra pratap singh
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
pauline234567
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 
Lab-2 Buffer Overflow In this lab, you will gain insight
Lab-2 Buffer Overflow        In this lab, you will gain insightLab-2 Buffer Overflow        In this lab, you will gain insight
Lab-2 Buffer Overflow In this lab, you will gain insight
simisterchristen
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Shakacon
 
Parallel port programming
Parallel port programmingParallel port programming
Parallel port programming
mangal das
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
ITExamAnswers.net
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
Mohit Dholakiya
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
Joy Sarker
 
Net Defender
Net DefenderNet Defender
Net Defender
krishna maddikara
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash
 
Don't Get Hacked on Hostile WiFi
Don't Get Hacked on Hostile WiFiDon't Get Hacked on Hostile WiFi
Don't Get Hacked on Hostile WiFi
Mackenzie Morgan
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
lamtran367679
 

Similaire à Disabling Ports 135 and 445 to protect the Road Warrior (20)

Sec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brownSec285 final presentation_joshua_brown
Sec285 final presentation_joshua_brown
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
 
FTTx GPON System Troubleshooting.pptx
FTTx GPON System Troubleshooting.pptxFTTx GPON System Troubleshooting.pptx
FTTx GPON System Troubleshooting.pptx
 
Zoom user manual
Zoom user manualZoom user manual
Zoom user manual
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02Firewallpresentation 100826052003-phpapp02
Firewallpresentation 100826052003-phpapp02
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
Lab-2 Buffer Overflow In this lab, you will gain insight
Lab-2 Buffer Overflow        In this lab, you will gain insightLab-2 Buffer Overflow        In this lab, you will gain insight
Lab-2 Buffer Overflow In this lab, you will gain insight
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
 
Parallel port programming
Parallel port programmingParallel port programming
Parallel port programming
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Vulnerability
VulnerabilityVulnerability
Vulnerability
 
Network Troubleshooting
Network TroubleshootingNetwork Troubleshooting
Network Troubleshooting
 
Net Defender
Net DefenderNet Defender
Net Defender
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Don't Get Hacked on Hostile WiFi
Don't Get Hacked on Hostile WiFiDon't Get Hacked on Hostile WiFi
Don't Get Hacked on Hostile WiFi
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 

Plus de David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
David Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
David Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
David Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
David Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
David Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
David Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
David Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
David Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
David Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
David Sweigert
 

Plus de David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Dernier

Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.
Vishal kr Thakur
 
Research, Monitoring and Evaluation, in Public Health
Research, Monitoring and Evaluation, in Public HealthResearch, Monitoring and Evaluation, in Public Health
Research, Monitoring and Evaluation, in Public Health
aghedogodday
 
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPTNURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
blessyjannu21
 
Monopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in TripuraMonopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in Tripura
SKG Internationals
 
Fit to Fly PCR Covid Testing at our Clinic Near You
Fit to Fly PCR Covid Testing at our Clinic Near YouFit to Fly PCR Covid Testing at our Clinic Near You
Fit to Fly PCR Covid Testing at our Clinic Near You
NX Healthcare
 
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
rightmanforbloodline
 
nursing management of patient with Empyema ppt
nursing management of patient with Empyema pptnursing management of patient with Empyema ppt
nursing management of patient with Empyema ppt
blessyjannu21
 
Management of Post Operative Pain: to make doctors conscious about the benefi...
Management of Post Operative Pain: to make doctors conscious about the benefi...Management of Post Operative Pain: to make doctors conscious about the benefi...
Management of Post Operative Pain: to make doctors conscious about the benefi...
Nilima65
 
Psychedelic Retreat Portugal - Escape to Lighthouse Retreats for an unforgett...
Psychedelic Retreat Portugal - Escape to Lighthouse Retreats for an unforgett...Psychedelic Retreat Portugal - Escape to Lighthouse Retreats for an unforgett...
Psychedelic Retreat Portugal - Escape to Lighthouse Retreats for an unforgett...
Lighthouse Retreat
 
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
PsychoTech Services
 
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
Kumar Satyam
 
2024 Media Preferences of Older Adults: Consumer Survey and Marketing Implica...
2024 Media Preferences of Older Adults: Consumer Survey and Marketing Implica...2024 Media Preferences of Older Adults: Consumer Survey and Marketing Implica...
2024 Media Preferences of Older Adults: Consumer Survey and Marketing Implica...
Media Logic
 
The Ultimate Guide in Setting Up Market Research System in Health-Tech
The Ultimate Guide in Setting Up Market Research System in Health-TechThe Ultimate Guide in Setting Up Market Research System in Health-Tech
The Ultimate Guide in Setting Up Market Research System in Health-Tech
Gokul Rangarajan
 
FACIAL NERVE
FACIAL NERVEFACIAL NERVE
FACIAL NERVE
aditigupta1117
 
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
xkute
 
Health Tech Market Intelligence Prelim Questions -
Health Tech Market Intelligence Prelim Questions -Health Tech Market Intelligence Prelim Questions -
Health Tech Market Intelligence Prelim Questions -
Gokul Rangarajan
 
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
DrDevTaneja1
 
English Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptxEnglish Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptx
MatSouthwell1
 
nurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdfnurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdf
Carolyn Harker
 
Pneumothorax and role of Physiotherapy in it.
Pneumothorax and role of Physiotherapy in it.Pneumothorax and role of Physiotherapy in it.
Pneumothorax and role of Physiotherapy in it.
Vishal kr Thakur
 

Dernier (20)

Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.
 
Research, Monitoring and Evaluation, in Public Health
Research, Monitoring and Evaluation, in Public HealthResearch, Monitoring and Evaluation, in Public Health
Research, Monitoring and Evaluation, in Public Health
 
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPTNURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
NURSING MANAGEMENT OF PATIENT WITH EMPHYSEMA .PPT
 
Monopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in TripuraMonopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in Tripura
 
Fit to Fly PCR Covid Testing at our Clinic Near You
Fit to Fly PCR Covid Testing at our Clinic Near YouFit to Fly PCR Covid Testing at our Clinic Near You
Fit to Fly PCR Covid Testing at our Clinic Near You
 
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
 
nursing management of patient with Empyema ppt
nursing management of patient with Empyema pptnursing management of patient with Empyema ppt
nursing management of patient with Empyema ppt
 
Management of Post Operative Pain: to make doctors conscious about the benefi...
Management of Post Operative Pain: to make doctors conscious about the benefi...Management of Post Operative Pain: to make doctors conscious about the benefi...
Management of Post Operative Pain: to make doctors conscious about the benefi...
 
Psychedelic Retreat Portugal - Escape to Lighthouse Retreats for an unforgett...
Psychedelic Retreat Portugal - Escape to Lighthouse Retreats for an unforgett...Psychedelic Retreat Portugal - Escape to Lighthouse Retreats for an unforgett...
Psychedelic Retreat Portugal - Escape to Lighthouse Retreats for an unforgett...
 
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
 
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
 
2024 Media Preferences of Older Adults: Consumer Survey and Marketing Implica...
2024 Media Preferences of Older Adults: Consumer Survey and Marketing Implica...2024 Media Preferences of Older Adults: Consumer Survey and Marketing Implica...
2024 Media Preferences of Older Adults: Consumer Survey and Marketing Implica...
 
The Ultimate Guide in Setting Up Market Research System in Health-Tech
The Ultimate Guide in Setting Up Market Research System in Health-TechThe Ultimate Guide in Setting Up Market Research System in Health-Tech
The Ultimate Guide in Setting Up Market Research System in Health-Tech
 
FACIAL NERVE
FACIAL NERVEFACIAL NERVE
FACIAL NERVE
 
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
一比一原版(UoA毕业证)昆士兰科技大学毕业证如何办理
 
Health Tech Market Intelligence Prelim Questions -
Health Tech Market Intelligence Prelim Questions -Health Tech Market Intelligence Prelim Questions -
Health Tech Market Intelligence Prelim Questions -
 
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
 
English Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptxEnglish Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptx
 
nurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdfnurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdf
 
Pneumothorax and role of Physiotherapy in it.
Pneumothorax and role of Physiotherapy in it.Pneumothorax and role of Physiotherapy in it.
Pneumothorax and role of Physiotherapy in it.
 

Disabling Ports 135 and 445 to protect the Road Warrior

  • 1. Windows Firewall Page 1 Security Instructions to close down unused laptop ports Written by: Dave Sweigert, CISSP, CISA, PMP ABSTRACT: Laptop users (road warriors) that are not usually operating within a local area network infrastructure behind a firewall may have certain communications ports enabled that place them at greater risk in public WiFi (wireless access) points. INTRODUCTION: This white paper will provide instructions on how to disable communications Ports 135 and 445 on a laptop used in a public wireless environment. Users should disable one port at a time, monitor the operation of their business critical applications, then enable another port after the observation period.. Again, monitor behavior then proceed. These instructions assume use of Windows 7. METHODS: Step One: Locate System Security tab from Control Panel by pressing the Microsoft Windows logo in the lower left area of your desktop.
  • 2. Windows Firewall Page 2 Step Two: Locate the FIREWALL capability. Step Three: Click Advanced Settings
  • 3. Windows Firewall Page 3 Step Four: Click INBOUND RULES on the left tool bar and observe NEW RULE in the right hand tool bar. Step Five: Click NEW RULE then observe a new dialogue box, click PORT.
  • 4. Windows Firewall Page 4 Step Six: Enter NEXT then observe SPECIFIED LOCAL PORTS; enter 135 then NEXT DISCUSSION: Well known malware Root kits can use port 135 to transmit data back to home base and download more malware. An attacker who can access TCP or ports 135, 139 or 445 could execute arbitrary code with Local System privileges. This allows the attacker to gain complete control over the exploited system. On systems protected by an infrastructure firewall, it is a standard practice to block these ports due to the known associated risks.
  • 6. Windows Firewall Page 6 Step Seven: Select BLOCK the connection and enter NEXT.
  • 7. Windows Firewall Page 7 Step Eight: Leave all check marks in-place and proceed with NEXT.
  • 8. Windows Firewall Page 8 Step Nine: Apply a suitable name to this rule; such as “Block Inbound Port 135”.
  • 9. Windows Firewall Page 9 Step Ten: Observe the new rule. Repeat the same process for OUTBOUND Port 135. After a positive observation period, repeat for Port 445 (notice OUTBOUND RULES below). RESULTS: Inbound and Outbound attempts to use these ports will be disabled. In sum, these ports are considered unnecessary in a WiFi public setting and are considered another gateway for malicious software and hacker activities.