Skip to content

Commit 7595107

Browse files
Fix hyperlinks
1 parent 7823fcf commit 7595107

File tree

1 file changed

+10
-12
lines changed

1 file changed

+10
-12
lines changed

ADDS/README.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1262,21 +1262,19 @@ There are 5 additional dynamic RPC ports present. An EPMAP query would have reve
12621262

12631263
| TCP Port | Transport | RPC Protocol |
12641264
|---------:|----------------|-------------------------------------------------------------------------|
1265-
| 49664 | `ncacn_ip_tcp` | [\[MS-SAMR\]: Security Account Manager (SAM) Remote Protocol] |
1266-
| 49667 | `ncacn_ip_tcp` | [\[MS-LSAD\]: Local Security Authority (Domain Policy) Remote Protocol] |
1267-
| 49668 | `ncacn_http` | [\[MS-LSAD\]: Local Security Authority (Domain Policy) Remote Protocol] |
1268-
| 49672 | `ncacn_ip_tcp` | [Key Isolation Service] |
1269-
| 49679 | `ncacn_ip_tcp` | [\[MS-RAA\]: Remote Authorization API Protocol] |
1270-
1271-
[\[MS-SAMR\]: Security Account Manager (SAM) Remote Protocol]: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-samr/4df07fab-1bbc-452f-8e92-7853a3c7e380
1272-
[\[MS-LSAD\]: Local Security Authority (Domain Policy) Remote Protocol]: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-lsad/1b5471ef-4c33-4a91-b079-dfcbb82f05cc
1273-
[Key Isolation Service]: https://learn.microsoft.com/en-us/windows/win32/seccng/key-storage-and-retrieval
1274-
[\[MS-RAA\]: Remote Authorization API Protocol]: https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-raa/98ab2e01-da37-4e76-bea5-8d4d83e66e1a
1265+
| 49664 | `ncacn_ip_tcp` | [\[MS-SAMR\]: Security Account Manager (SAM) Remote Protocol](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-samr/4df07fab-1bbc-452f-8e92-7853a3c7e380) |
1266+
| 49667 | `ncacn_ip_tcp` | [\[MS-LSAD\]: Local Security Authority (Domain Policy) Remote Protocol](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-lsad/1b5471ef-4c33-4a91-b079-dfcbb82f05cc) |
1267+
| 49668 | `ncacn_http` | [\[MS-LSAD\]: Local Security Authority (Domain Policy) Remote Protocol](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-lsad/1b5471ef-4c33-4a91-b079-dfcbb82f05cc) |
1268+
| 49672 | `ncacn_ip_tcp` | [Key Isolation Service](https://learn.microsoft.com/en-us/windows/win32/seccng/key-storage-and-retrieval) |
1269+
| 49679 | `ncacn_ip_tcp` | [\[MS-RAA\]: Remote Authorization API Protocol](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-raa/98ab2e01-da37-4e76-bea5-8d4d83e66e1a) |
12751270

12761271
These ports are allowed by the built-in [Active Directory Domain Controller (RPC)](#active-directory-domain-controller-rpc) rule.
12771272
The respective protocols are exposed through the `ncacn_np` RPC transport as well.
1278-
As a matter of fact, Windows client components seem to be using the `\PIPE\lsass` named pipe exclusively when communicating over these RPC protocols.
1279-
Consequently, the RPC dynamic port range (`49152/TCP` to `65535/TCP`) on domain controllers does not need to be accessible by member computers for AD to work properly. We therefore typically block this port range on firewall appliances.
1273+
As a matter of fact, Windows client components seem to be using the `\PIPE\lsass` named pipe exclusively
1274+
when communicating over these RPC protocols.
1275+
Consequently, the RPC dynamic port range (`49152/TCP` to `65535/TCP`) on domain controllers
1276+
does not need to be accessible by member computers for AD to work properly.
1277+
We therefore typically block this port range on firewall appliances.
12801278

12811279
A UDP port scan should yield far less interesting results:
12821280

0 commit comments

Comments
 (0)