[1] Implementing CIFS:

[2] The Cable Guy TechNet column:

[3] Windows Network Data and Packet Filtering:

[4] NAT Clients Cannot View Web Sites After You Install SQL 2000 SP2 or SP3 on an RRAS Server:

[5] Netstat Does Not Display Listening TCP Ports:

[6] App Request UDP Only, "Netstat -an" Displays TCP and UDP:

[7] The NETSTAT Command Incorrectly Shows Ports in Listening States:

[8] hping:

[9] Netcat for NT 1.11:

[10] TDIMon:

[11] Local Host Monitor 1.1:

[12] HOW TO: Determine Which Program Uses or Blocks Specific Transmission Control Protocol Ports in Windows

[13] The netstat command can now display process IDs that correspond to active TCP or UDP connections in Windows 2000:

[14] TCPView:

[15] Network Ports Used by Key Microsoft Server Products:

[16] fport:

[17] NT port binding insecurity:

[18] socat - Multipurpose relay:

[19] NT needs privileged ports:

[20] Enabling NetBT to Open IP Ports Exclusively:

[21] Applications May Be Able To "Listen" on TCP or UDP Ports:


[23] BUG: Non-administrator users cannot set the SO_EXCLUSIVEADDRUSE option on the Winsock setsockopt API call:

[24] Windows Packet Capture Library:

[25] Atelier Web Ports Traffic Analyzer:

[26] HOW TO: Install Microsoft Loopback Adapter in Windows 2000:

[27] SMB: The Server Message Block Protocol.

[28] NBT: NetBIOS over TCP/IP:

[29] Samba-TNG:

[30] Direct Hosting of SMB Over TCP/IP (Q204279):

[31] NetBT and raw SMB transport:

[32] RPC: Remote Procedure Call Control Specification Version 2:

[33] DCE 1.1: Remote Procedure Call:

[34] A brief history of Windows:

[35] DCE 1.1: Remote Procedure Call - Introduction to the RPC API:

[36] WinObj:

[37] RPC tools:

[38] PipeList:

[39] Filemon for Windows:

[40] npfs aliases:

[41] ifids: named pipes endpoints:

[42] PipeACL tools v1.0:

[43] Win32 Pipe Security Editor Windows NT/2000/XP:

[44] LogonSessions v1.1:

[45] You Can Use The Llsrpc Named Pipe to Add or Delete Licenses and Create New License Groups:

[46] Vulnerability in the License Logging Service Could Allow Code Execution (885834):

[47] Vulnerability in Web Client Service Could Allow Remote Code Execution (911927)

[48] Windows 2000, Null Sessions and MSRPC:

[49] UserInfo and UserDump tools:

[50] ACL tools v1.0:

[51] Private objects security auditing (LogAnalysis mailing list):

[52] The Ethereal Network Analyzer:

[53] Samba 4 IDL for the lsarpc interface:

[54] Samba 4 IDL for the dssetup interface:

[55] Samba 4 IDL for the samr interface:

[56] Samba 4 IDL for the netlogon interface:

[57] Samba 4 IDL for the eventlog interface:

[58] Samba 4 IDL for the netdfs interface:

[59] Samba 4 IDL for the srvsvc interface:

[60] Samba 4 IDL for the svcctl interface:

[61] Samba 4 IDL for the winreg interface:

[62] Samba 4 IDL for the wkssvc interface:

[63] Ethereal SVN repository:

[64] Windows Workstation Service Remote Buffer Overflow:

[65] Buffer Overrun in the Workstation Service Could Allow Code Execution (828749):

[66] Samba 4 IDL for the spoolss interface:

[67] Vulnerability in Print Spooler Service Could Allow Remote Code Execution (896423):

[68] Minimizing Windows network services:

[69] dcedump (part of the SPIKE toolkit):

[70] Endpoint Mapper Interface Definition:

[71] Distributed Component Object Model Protocol -- DCOM/1.0:

[72] Microsoft Debugging Tools:

[73] Understanding the DCOM Wire Protocol by Analyzing Network Data Packets:

[74] Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability:

[75] Locator Service Buffer Overflow Vulnerability:

[76] Unchecked Buffer in Locator Service Could Lead to Code Execution (810833):

[77] Windows PopUP SPAM:

[78] Buffer Overrun in Messenger Service Could Allow Code Execution (828035):

[79] Samba 4 IDL for the atsvc interface:

[80] Samba 4 IDL for the drsuapi interface:

[81] TCP ports, UDP ports, and RPC ports that are used by Message Queuing:

[82] Vulnerability in Message Queuing Could Allow Code Execution (892944):

[83] drsuapi MSRPC interface Ethereal dissector:

[84] Windows Local Security Authority Service Remote Buffer Overflow:

[85] LSASS Vulnerability - CAN-2003-0533:

[86] Sasser Worm Technical Analysis:

[87] XCCC: Exchange 2000 Windows 2000 Connectivity Through Firewalls:

[88] RPC Interfaces That Are Exposed by Secure Mail Publishing in ISA Server 2000:

[89] How MAPI Clients Access Active Directory:

[90] Be Wary of Other RPC Endpoints Running in the Same Process:

[91] Process Explorer:

[92] services.exe RPC services:

[93] DCE/RPC over SMB: Samba and Windows NT Domain Internals. Luke Kenneth Casson Leighton. Macmillan Technical Publishing, 2000.

[94] RPC Interface Restriction: Changes to Functionality in Microsoft Windows XP Service Pack 2 (Part 2: Network Protection Technologies)

[95] List of Remote Procedure Call (RPC) fixes in Windows XP Service Pack 2 and in Windows XP Tablet PC Edition 2005: