[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] TCP initial sequence number (ISN) generation port 139 port scanning inverse standard scanning methods third-party types probe responses RST/ACK packet scanning, stealth sequence incrementation SYN/ACK packet tcpdump utility ICMP echo reply messages output telephone numbers telephone war dialing telephone-based attacks Telnet banner list brute-force password-grinding fingerprinting manual service assessment vulnerabilties telnet command 2nd telnet port telnetd service telnetfp utility TESO team web site text segment (runtime memory) third-party port scanning Thumann, Michael timestamp request message Tivoli user login name TNS (Transparent Network Substrate) TNS Listener COMMAND stack overflow commands enumeration and information leak attacks falsified command request process-manipulation vulnerabilities service, pinging status command tnscmd.pl tnscmd.pl documentation tools required for network security assessment ToolTalk Database (TTDB) service ToorCon web site traceroute utility 2nd Transparent Network Substrate (TNS) tsgrinder utility TSIG overflow ttdbserverd service TTL field data of received RST packets Type 13 (timestamp request) (ICMP message type) Type 15 (information request) (ICMP message type) Type 17 (subnet address mask request) (ICMP message type) Type 8 (echo request) (ICMP message type) |