[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] N-Stealth utility 2nd 3rd 4th Name Table (NBT) requests NASDAQ Navy web servers nbtstat utility using to dump NetBIOS name table negative-size bug in C Nessus development mailing list Nessus utility net command net users command Net-SNMP NetBIOS authenticating with datagram service executing commands name service attacking remote maintenance session service enumerating system details NetBIOS Name Table (NBT) requests netbios-dgm port netbios-ns port netbios-ssn port Netcraft Netric web site netstat services network enumeration Network Information Center (NIC) WHOIS querying network scanning 2nd best practices countermeasures full initial network security assessment methodology rationale behind tools required [See tools required for network security assessment] network services identifying accessible services vulnerabilities 2nd network testing, low-level network topology, simplifying netXeyes newroot web site newsgroup searches 2nd 3rd nfsd command NIC (Network Information Center) querying 2nd tools and examples nikto utility 2nd 3rd Nimda worm nisd service nlockmgr (rpc.lockd) nmap utility -sP option -T Sneaky option fragmenting probe packets inverse TCP flag scanning IP fingerprinting performing a full TCP scan ping sweeping with port scanner FTP bounce scans UDP scan Nmap-hackers mailing list NSA (United States National Security Agency) NSAT utility nslookup client 2nd nslookup utility 2nd DNS zone transfer gleaning BIND version information nslookupcomplain( ) format string bug NTA Monitor NTBugTraq mailing list NXDOMAIN overflow NXT record overflow |