TCP/IP Vulnerability Analysis