[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] r-services brute force clients directly accessing vulnerabilities RCPT TO: (Sendmail) RCPT TO: user enumeration attacks RDP (Remote Desktop Protocol) brute-force password-grinding vulnerabilities recommendations, long-term reconnaissance initial process techniques Red Hat regdmp command regini command registers registrars, international registry keys, modifying reload command (TNS Listener) Remote Desktop Protocol [See RDP] remote information services, assessing remote maintenance services assessing attack types common types Remoxec utility Réseaux IP Européens (RIPE) reverse DNS sweeps 2nd reverse lookup attacks rexecd .rhosts file RID cycling 2nd RIPE queries Ritter, Jordan 2nd rlogind service 2nd Rosenthal, Chip RPC (Remote Procedure Call) services DCOM heap overflows DCOM interface stack overflow endpoint mapper enumerating system information endpoints and interfaces, listing all registered enumerating expoiting directly identifying without portmapper portmapper rusers service vulnerabilities rpc.cmsd vulnerability rpc.statd vulnerability rpc.ttdbserverd rpcbind rpcclient commands createdomuser deletedomuser enumdomgroups enumdomusers lookupnames lookupsids lsaaddacctrights lsaremoveacctrights querydominfo querygroup queryuser rpcclient commands rpcdump utility 2nd RpcScan utility rpctools package rpdscan utility rquotad RSA Security RSH connections, spoofing rsh, setting up backdoor rshd RST packets RST/ACK packet RtlHeap algorithm runtime memory organization rusers service 2nd rwalld service rwhod service |