Twenty Year Anniversary
Showing 76 - 84 of 84 RSS Feed

Files

snort-ids.trinoo.txt
Posted Dec 14, 1999
Authored by Stefan Aeschbacher | Site aeschbacher.ch

Rules for the Snort IDS to detect trinoo. This rules work only as long as the ports/passwords/protocol aren't changed.

tags | denial of service, protocol
MD5 | 2b91a4c5ad5bfa7061b5a1c62f4c8d2e
dsit_workshop.pdf
Posted Dec 9, 1999
Authored by David Dittrich, Clarissa Cook, Richard Kemmerer

Results of the Distributed-Systems Intruder Tools Workshop (Nov 2-4, 1999). Several distributed intruder tools are in widespread use now, and the technology is maturing. As a result, a single command from an attacker can result in tens of thousands of concurrent attacks.

tags | denial of service
MD5 | b69cb60c78ff79ee69d4513e534245f9
blitznet.tgz
Posted Dec 9, 1999
Authored by Phreeon

Blitznet launches a distributed syn flood attack with spoofed source IP, without logging.

tags | denial of service, spoof
MD5 | c58067ac29321e40ba72d357c136f798
trinoo.tgz
Posted Dec 9, 1999

Trinoo daemon source - Implements a distributed denial of service attack. Controlled via UDP.

tags | denial of service, udp
MD5 | a7d1bda7617f17b021617ae3c782fc6e
distributed_metastasis.doc
Posted Aug 17, 1999
Authored by Andrew J. Stewart

A new model of computer penetration: distributed metastasis, increases the possible depth of penetration for an attacker, while minimizing the possibility of detection. Distributed Metastasis is a non-trivial methodology for computer penetration, based on an agent based approach, which points to a requirement for more sophisticated attack detection methods and software to detect highly skilled attackers.

tags | denial of service
MD5 | f60d02052189d8734d7fffdbc76eb779
saltine-cracker-1.05.00.tar.gz
Posted Aug 17, 1999
Authored by Ambient Empire

Saltine Cracker v1.05 is a TCP/IP Distributed Network Password Auditing Tool for NTHASH (MD4) and POSIX LibDES Crypt(3) passwords. With the incorporated cross-compatiblity, you can audit Win9X/NT client passwords attached to POSIX servers and vice-versa.

tags | denial of service, tcp
systems | windows
MD5 | dd7b4dc6f6572dac714e538eda547ab2
slurpie.tgz
Posted Aug 17, 1999
Authored by Adam Klosowicz

Slurpie v2.0b - Slurpie is a passwd file cracker similar to CrackerJack and John the Ripper except that it runs in a distributed environment. It supports file based and generated dictionary comparison.

tags | denial of service
MD5 | 820b4bf746e0a1297516ddd4a83958db
tfn.analysis.txt
Posted Aug 17, 1999
Authored by David Dittrich

The following is an analysis of the "Tribe Flood Network", or "TFN", by Mixter. TFN is ai powerful distributed attack tool and backdoor currently being developed and tested on a large number of compromised Unix systems on the Internet. TFN source available here.

tags | denial of service
systems | unix
MD5 | 5e83210b7399408c0735c3ea14cdfe35
trinoo.analysis.txt
Posted Aug 17, 1999
Authored by David Dittrich

The following is an analysis of the DoS Project's "trinoo" (a.k.a. "trin00") master/slave programs, which implement a distributed network denial of service tool. Trinoo daemons were originally found in binary form on a number of Solaris 2.x systems, and probably being set up on hundreds, perhaps thousands, of systems on the Internet that are being compromised by remote buffer overrun exploitation.

tags | remote, denial of service, overflow
systems | solaris
MD5 | 850306089225ee486a29ed60b7f5dd71
Page 4 of 4
Back1234Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Expands Bug Bounty To Include Fraud Protection Bypass
Posted Aug 16, 2018

tags | headline, fraud, flaw, google
Credit Card Skimmers Now Need To Fear The Reaper
Posted Aug 16, 2018

tags | headline, hacker, bank, cybercrime, fraud, conference
The Hackers Hunting Down Missing People
Posted Aug 16, 2018

tags | headline, hacker, privacy, conference
President Trump Relaxes US Cyber-Attack Rules
Posted Aug 16, 2018

tags | headline, government, usa, cyberwar, fbi, nsa, cia
Mystery Russian Satellite's Behavior Raises Alarm In US
Posted Aug 15, 2018

tags | headline, usa, russia, space, cyberwar, spyware
Adobe Fixes Critical Code Execution Flaws In Latest Patch Update
Posted Aug 15, 2018

tags | headline, flaw, adobe, patch
Instagram Hack Is Locking Hundreds Of Users Out Of Their Accounts
Posted Aug 15, 2018

tags | headline, hacker, denial of service, password, facebook
Foreshadow And Intel SGX Software Attestation: The Whole Trust Model Collapses
Posted Aug 15, 2018

tags | headline, flaw, cryptography, intel
Hackers Can Edit Policy Body Cam Footage Without Anybody Noticing
Posted Aug 15, 2018

tags | headline, hacker, government
Google Tracks Users Who Turn Off Location History
Posted Aug 15, 2018

tags | headline, privacy, google, spyware
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close