O'Reilly logo

Hacking Exposed 7: Network Security Secrets & Solutions by George Kurtz, Joel Scambray, Stuart McClure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

image N

name spoofing, 174–175

nameservers, 34–35, 39, 42

Nanda, Arup, 152

NAT (NetBIOS Auditing Tool), 118

National Internet Registries (NIRs), 28

National Vulnerability Database, 181

NBNS (NetBIOS Name Service), 110–115, 174, 175

NBT (NetBIOS over TCP/IP), 115

NBTEnum tool, 123–124, 128

nbtscan tool, 112–113

nbtstat command, 112–113

nc. See netcat

ncat utility, 70

near field communication (NFC) technology, 634

NeoTrace, 45

Nessus scanner, 538–539

Nessus scanning, 87–88, 155

.NET Framework (.NET FX), 567–568

net view command, 110–111

.NET web.config files, 541

NetBIOS

bindings, 212

disabling, 166, 682

names, 175

naming protocols, 174–175

service codes, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required