| < Day Day Up > |
|
name resolution
command-line options, 202
and DNS lookups, 29, 205
overview, 139–140
repeated addresses, 205–206
NCP (NetWare Core Protocol), 233, 236
negative numbers, 243
Net Optics cable taps, 21
Net-SNMP, 77, 100, 111, 384
Netasyst
capturing and saving data with, 340–341
overview, 339
reading Ethereal files with, 341–342
netbeui keyword, 214
NetBIOS Extended User Interface (NetBEUI), 214
NetBus trojan, 361–363
NetWare Core Protocol (NCP), 233, 236
network access layer, DoD model, 18
network analysis, 2, 35–37. See also sniffing, defined
network analyzers. See also Ethereal; sniffers
basic parts, 4
buffer component, 4
capture driver, 4, 78, 121–122
decode component, 4
examples, 9–11
hardware, 4
how they work, 35–36
intruder use, 6–8
list of sniffer products, 9–11
overview, 2–3
policy issues, 33, 36–37
real-time analysis feature, 4
reasons for using, 5–11, 35
who uses, 35
Network Associates Sniffer, 9, 43, 304, 307, 339, 342. See also Netasyst
Network File System (NFS), 19
Network Instruments Observer, 44, 305, 307
network interface cards (NICs)
capturing traffic, 211, 352
hardware addresses, 211
promiscuous, 15, 27–29
network intrusion detection system (NIDS), 320. See also Snort
network layer, Open Systems Interconnection (OSI) model, 17
Network Monitor. See Microsoft Network Monitor
network name resolution, 139, 205
Network News Transfer Protocol (NNTP), 19
Network Promiscuous Ethernet Detector (Neped), 30
network scanning. See scanning
networks
scanning (See scanning)
sniffing traffic, 6–8
troubleshooting with Ethereal, 64–68
NetXRay, 43, 305
NFS (Network File System), 19
NICs. See network interface cards (NICs)
NIDS (network intrusion detection system), 320. See also Snort
Nmap, 8, 78
NNTP (Network News Transfer Protocol), 19
non-disclosure agreements, 33
Not Equal To operator, 218
not operator, 212–213, 244
Novell LANalyzer, 43, 304, 307
NSIS install package, 391
Null scans, 358–359
| < Day Day Up > |
|