Port 135

Port 135

Port 135 is certainly not a port that needs to be, or should be, exposed to the Cyberspace. Hacker tools such equally “epdump” (Endpoint Dump) are able to immediately place every DCOM-related server/service running on the user’s hosting computer and match them upward with known exploits against those services.

Any machines placed behind a NAT router (any typical residential or small business organization broadband IP-sharing router) volition exist inherently condom. And any practiced personal software firewall should also be able to hands block port 135 from external exposure. That’s what yous want.

In improver, many security conscious ISPs are now blocking port 135 along with the notorious “NetBIOS Trio” of ports (137-139). So even without any of your own proactive security, you may find that port 135 has been blocked and stealthed on your behalf past your Isp.

Going Further:  Closing port 135

The widespread exposure and insecurity of this port has generated a great deal of concern among PC gurus. This has resulted in several approaches to shutting downward the Windows DCOM server and firmly closing port 135 once and for all. Although applications may be “DCOM enabled” or “DCOM aware”, very few, if whatsoever, are actually dependent upon the presence of its services. Consequently, it is usually possible (and generally desirable if yous’re comfortable doing such things) to shut down DCOM and close port 135 without any ill effects. (The fewer things running in a Windows arrangement, the fewer things to suck up RAM and slow everything else down.)

If you are curious near taking control of and terminating another unnecessary Windows “service”, the following links will provide y’all with the information and instructions you’ll demand:

Baca Juga :   Jaiz Tasawi

For Intrepid Experts Simply

Come across the first question on this
Microsoft Knowledgebase page
under “General COM Security Issues: How do I enable or disable DCOM?

A page of assorted DCOM info:

The entire contents of this folio is copyright © 2008 by Gibson Research Corporation.

Port 135

Source: https://www.grc.com/port_135.htm