Exploit the possiblities
Showing 76 - 84 of 84 RSS Feed

Files

snort-ids.trinoo.txt
Posted Dec 14, 1999
Authored by Stefan Aeschbacher | Site aeschbacher.ch

Rules for the Snort IDS to detect trinoo. This rules work only as long as the ports/passwords/protocol aren't changed.

tags | denial of service, protocol
MD5 | 2b91a4c5ad5bfa7061b5a1c62f4c8d2e
dsit_workshop.pdf
Posted Dec 9, 1999
Authored by David Dittrich, Clarissa Cook, Richard Kemmerer

Results of the Distributed-Systems Intruder Tools Workshop (Nov 2-4, 1999). Several distributed intruder tools are in widespread use now, and the technology is maturing. As a result, a single command from an attacker can result in tens of thousands of concurrent attacks.

tags | denial of service
MD5 | b69cb60c78ff79ee69d4513e534245f9
blitznet.tgz
Posted Dec 9, 1999
Authored by Phreeon

Blitznet launches a distributed syn flood attack with spoofed source IP, without logging.

tags | denial of service, spoof
MD5 | c58067ac29321e40ba72d357c136f798
trinoo.tgz
Posted Dec 9, 1999

Trinoo daemon source - Implements a distributed denial of service attack. Controlled via UDP.

tags | denial of service, udp
MD5 | a7d1bda7617f17b021617ae3c782fc6e
distributed_metastasis.doc
Posted Aug 17, 1999
Authored by Andrew J. Stewart

A new model of computer penetration: distributed metastasis, increases the possible depth of penetration for an attacker, while minimizing the possibility of detection. Distributed Metastasis is a non-trivial methodology for computer penetration, based on an agent based approach, which points to a requirement for more sophisticated attack detection methods and software to detect highly skilled attackers.

tags | denial of service
MD5 | f60d02052189d8734d7fffdbc76eb779
saltine-cracker-1.05.00.tar.gz
Posted Aug 17, 1999
Authored by Ambient Empire

Saltine Cracker v1.05 is a TCP/IP Distributed Network Password Auditing Tool for NTHASH (MD4) and POSIX LibDES Crypt(3) passwords. With the incorporated cross-compatiblity, you can audit Win9X/NT client passwords attached to POSIX servers and vice-versa.

tags | denial of service, tcp
systems | windows
MD5 | dd7b4dc6f6572dac714e538eda547ab2
slurpie.tgz
Posted Aug 17, 1999
Authored by Adam Klosowicz

Slurpie v2.0b - Slurpie is a passwd file cracker similar to CrackerJack and John the Ripper except that it runs in a distributed environment. It supports file based and generated dictionary comparison.

tags | denial of service
MD5 | 820b4bf746e0a1297516ddd4a83958db
tfn.analysis.txt
Posted Aug 17, 1999
Authored by David Dittrich

The following is an analysis of the "Tribe Flood Network", or "TFN", by Mixter. TFN is ai powerful distributed attack tool and backdoor currently being developed and tested on a large number of compromised Unix systems on the Internet. TFN source available here.

tags | denial of service
systems | unix
MD5 | 5e83210b7399408c0735c3ea14cdfe35
trinoo.analysis.txt
Posted Aug 17, 1999
Authored by David Dittrich

The following is an analysis of the DoS Project's "trinoo" (a.k.a. "trin00") master/slave programs, which implement a distributed network denial of service tool. Trinoo daemons were originally found in binary form on a number of Solaris 2.x systems, and probably being set up on hundreds, perhaps thousands, of systems on the Internet that are being compromised by remote buffer overrun exploitation.

tags | remote, denial of service, overflow
systems | solaris
MD5 | 850306089225ee486a29ed60b7f5dd71
Page 4 of 4
Back1234Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
German Hacker Offers Rare Look Inside Secretive World Of Julian Assange, WikiLeaks
Posted Jan 18, 2018

tags | headline, hacker, government, britain, data loss, germany
Google Intros Security Center Tool For G Suite
Posted Jan 18, 2018

tags | headline, google
Ex-Santander Bank Manager Pleads Guilty To Computer Misuse Crimes
Posted Jan 18, 2018

tags | headline, privacy, bank, data loss, fraud
BIND Comes Apart Thanks To Ancient Denial Of Service Vuln
Posted Jan 17, 2018

tags | headline, dns, denial of service, flaw
Another Round Of Click-Fraud Extensions Pulled From Chrome Store
Posted Jan 17, 2018

tags | headline, malware, phone, google
Satori Botnet Successor Targets Ethereum Mining Rigs
Posted Jan 17, 2018

tags | headline, malware, bank, botnet, fraud
Flaw In VR Porn App Leaves 20,000 Names Exposed
Posted Jan 17, 2018

tags | headline, privacy, flaw
After False Hawaii Missile Notice, FCC Launches Investigation
Posted Jan 15, 2018

tags | headline, government, usa, cyberwar
MaMi Malware Targets Mac OS X DNS Settings
Posted Jan 15, 2018

tags | headline, malware, dns, fraud, apple
Meltdown-Spectre Patches Causing Issues With Industrial Companies
Posted Jan 15, 2018

tags | headline, flaw, patch, scada, intel
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close