T

TCP (Transmission Control Protocol), 36
TCP flags, 70
TCP headers, 57, 377, 382-383
TCP/IP
accessing UNIX systems via, 214-261
fragmented , 490
NetBIOS over TCP/IP (NBT), 149-150
TCP/IP filters, 202
TCP ping scans , 46-47
TCP ports
DNS zone transfers, 84-86
enumeration and, 84-88
listed, 651-656
network devices, 360-363
port 13, 364
port 20, 475-476
port 22, 137
port 25, 72
port 53, 84-86
port 69, 86
port 79, 87-88
port 80, 72, 88-91
port 111, 128-129
port 113, 58
port 135, 59, 161
port 139, 58-59, 68, 96-111, 143, 148-151, 164
port 179, 116-118
port 389, 118-122
port 445, 59, 68, 97, 106, 143, 149-151, 164
port 524, 123-127
port 1434, 131-133
port 2049, 133
port 3268, 118-122
port 7000, 616
port 8888, 593
port 9001, 365
port 27665, 496
port 32771, 128-129
port 34555, 496
sequence number prediction, 381-382
TCP scans, 51-68
TCP sequence number prediction, 381-382
TCP services, 53-59
TCP sessions, 381-382
TCP streams, 191-192, 260
TCP SYN attacks, 491-497
TCP Windows scan, 53
TCP Wrappers, 88, 221
tcpdump program
detecting sniffers, 281
promiscuous-mode attacks, 215, 259-261
RIP spoofing, 394-395
as traffic sniffer, 382-383
wireless networks, 431-432
Tcp_scan tool, 66
TeeNet tool, 217
telecommunications equipment closets, 324
Teleport Pro utility, 9
telnet
banner grabbing , 79-81
reverse telnet, 233-235
unauthenticated, 483
Telnet brute force attacks, 399
telnet client, 233-235
Terminal Server, 118, 187, 204
Terminal Services, 187-188
Terraserver, 423
Test Drive PCPLUSTD, 317
test systems, 34-35
TFN (Tribe Flood Network), 495-496
TFN2K tool, 496
TFTP (Trivial File Transfer Protocol), 86, 387-389, 392
TFTP downloads, 392-393
TFTP servers, 387
THC (The Hacker's Choice), 166-167, 435
THC-Scan tool, 298-299, 304-308
THC-Hydra tool, 216
The Hacker's Choice (THC), 166-167, 435
Thomas, Rob, 356, 401-402
Thompson, Ken, 212
threads, 638-639
threat modeling, 525-526, 534
three-way handshake, 491, 493
threshold logging, 67
time-to-live. See TTL
time zones, 50-51
timestamps, 50-51, 289, 414
Titan FTP Server, 515-516
tkined tool, 75
TLCFG utility, 300-303
TLDs (top-level domains), 21-22, 28
TLS (Transport Layer Security), 345
ToneLoc tool, 299-304
Top Layer tool, 499
TOS (type of service), 70
traceroute output, 357-358
traceroute probes, 39
traceroute utility, 37-40, 354-356, 467-468
tracerouting, 37-40, 355, 357, 359
tracert utility, 37-40, 354-356, 467
traffic sniffing attacks, 400
Transact SQL, 561-564
Transaction Signature (TSIG) feature, 253-254
Translate: f vulnerability, 540-542
Transmission Control Protocol. See TCP
Transport Layer Security (TLS), 345
trap handling, 404-405
Tribe Flood Network (TFN), 495-496
Tridgell, Andrew, 99
Trillian client, 617
Trinoo tool, 495-496
Trinux, 290
Tripwire program, 157, 278
Trivial File Transfer Protocol. See TFTP
Trojan horses
180 Solutions Trojan, 595
accidental, 576
described, 634
Solaris systems, 279
UNIX, 277-279
trunk lines, 377
trunk ports, 381
Trunking Protocol, 377-378, 381
trusted domains, 101, 104-105, 110
Trusted Sites zone, 602-604
Trustworthy Computing (TWC), 141
TS-CFG utility, 305, 307
TSIG (Transaction Signature) feature, 253-254
TTL (time-to-live), 37, 506
TTL attribute, 73-74
TTL-exceeded packets, 355
TTL expired packets, 355, 467-468
TTL field, 37
TTL packets, 355, 467-468
tunnel mode, 382
tunnels
described, 336
ICMP, 479-480
UDP, 479-480
VPNs, 335-336
TWC (Trustworthy Computing), 141
two-factor authentication, 324, 346
type of service (TOS), 70


Hacking Exposed
Hacking Exposed 5th Edition
ISBN: B0018SYWW0
EAN: N/A
Year: 2003
Pages: 127

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net