Exploit the possiblities
Showing 1 - 25 of 187 RSS Feed

Files

challenges.tgz
Posted Sep 15, 2004
Authored by priestmaster | Site priestmaster.org

This package contains example vulnerable C programs. The best way to learn exploit coding is by doing it. Start your search with the index.html. There are examples of buffer overflows (stack and heap) and format string vulnerabilities. All examples are exploitable with a standard linux/x86 environment.

tags | paper, overflow, x86, vulnerability
systems | linux
MD5 | c6de29cc9680ed2faa6adbca36bf5651
ids.html
Posted Aug 15, 2001
Authored by John Kozubik

Structural Versus Operational Intrusion Detection - Intrusion Detection White Paper - short and basic, comments requested.

tags | paper
MD5 | 4759aeddf74d87710e35bace4b78ab39
forensics.kye.html
Posted May 22, 2000
Authored by Lance Spitzner | Site enteract.com

"Know Your Enemy: A Forensic Analysis". This paper is a continuation of the Know Your Enemy series. The first three papers covered the tools and tactics of the black-hat community. This paper, the fourth of the series, studies step by step a successful attack of a system. However, instead of focusing on the tools and tactics used, we will focus on how we learned what happened and pieced the information together. The purpose is to give you the forensic skills necessary to analyze and learn on your own the threats your organization faces.

tags | paper
MD5 | 3c7c4c7fa100ea900c03936d32c2ea4b
network-intrusion-detection.htm
Posted Jan 28, 2000
Authored by Robert Graham

FAQ: Network Intrusion Detection Systems version 0.8.1 - (Updated Jan 17, 2000) This FAQ has lots of excellent info on IDS systems, with a good focus on how they work.

tags | paper
MD5 | 8461930a653e8e98844661d5ef6a3279
backdoors.txt
Posted Aug 17, 1999

Document detailing different types of backdoors.

tags | paper
MD5 | f43722e435c515aef0dcbed512f211ca
cidf.txt
Posted Aug 17, 1999

No information is available for this file.

tags | paper
MD5 | 328d68c0aea37a59a2e47577134c63f1
cracker.txt
Posted Aug 17, 1999

"Techniques Adopted by 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks." Whitepaper by Network Security Solutions, Ltd.

tags | paper
MD5 | 00c72fb176d12f91878a3b04e2345a5d
ftp-paper.txt
Posted Aug 17, 1999

No information is available for this file.

tags | paper
MD5 | 5799180295111023bc2805e14f2d19ad
hedrick-intro.txt
Posted Aug 17, 1999

No information is available for this file.

tags | paper
MD5 | 6ad6652c4ef0b286a2e414d10a95de88
ntob.htm
Posted Aug 17, 1999
Authored by Paul Merrill

NOT the Orange Book - Guide to the Definition, Specification, Tasking, and Documentation for the Development of Secure Computer Systems -- Including Condensations of the Members of the Rainbow Series and Related Documents".

tags | paper
MD5 | e46b54564bbb91eeafbd34a8149e47b3
sequence_attacks.txt
Posted Aug 17, 1999

No information is available for this file.

tags | paper
MD5 | e75ee97e47404cd0952487fd8e8bcd8f
them_and_us.txt
Posted Aug 17, 1999

No information is available for this file.

tags | paper
MD5 | 1b4873350b5fea0e73b504bdd6a5625a
cifs.txt
Posted Aug 17, 1999

No information is available for this file.

tags | paper
MD5 | 818b5ca97309f54fba6319d915b188fc
common.attacks.html
Posted Aug 17, 1999
Authored by Craig H. Rowland

Common System Intrusion Methods - An excellent whitepaper that describes the most common methods for gaining access to a target host.

tags | paper
MD5 | 3c50168987e407582116fa977e2cfed6
enemy.html
Posted Aug 17, 1999
Authored by Lance Spitzner

Know Your Enemy: The Attack of the Script Kiddie.

tags | paper
MD5 | 25f5751357088891d3f7423d7022db70
enemy2.html
Posted Aug 17, 1999
Authored by Lance Spitzner

The follow-up article to "Know Your Enemy: The Attack of the Script Kiddie", "Know your Enemy II" focuses on intelligence gathering, specifically how to determine what the enemy is doing by analyzing your system log files. Includes examples based on two of the most commonly used scanning tools on the Internet, sscan and nmap.

tags | paper
MD5 | 63a28996068f3ef305971545067de11c
enemy3.html
Posted Aug 17, 1999
Authored by Lance Spitzner

Know Your Enemy III: They Gain Root - Third installment of the excellent "Know Your Enemy" series of security whitepapers by Lance Spitzner. This paper focuses on how systems are actually compromised, and what the "script kiddie" does to cover tracks and monitor your network. Includes system logs and keystroke history from an actual system compromise.

tags | paper, root
MD5 | ef4a7778516a4baf2beb3b4e7e3317f5
hire.a.hacker.html
Posted Aug 17, 1999

"Hire A Hacker FAQ" - An excellent, and quite humorous, list of the issues that will invariably come up when people without previous experience in the hacker community try to hire a hacker. Excellent FAQ by Peter Seebach

tags | paper
MD5 | 57d70f32e9719c213ac7142dc8574eaf
improve_by_breakin.txt
Posted Aug 17, 1999

No information is available for this file.

tags | paper
MD5 | f42501b7f63fd0e4aea99b1bb56bb3c5
mac_address_cloning.pdf
Posted Aug 17, 1999
Authored by Kingpin

At one time or another, you may find it useful to have two machines with the same physical network address. This is how it is done.

tags | paper
MD5 | 59b643b18d898001624d73818bcaca38
probes.html
Posted Aug 17, 1999
Authored by Ron Gula

"How to Handle and Identify Network Probes" - "Do you know what to do when suspicious network probes are detected on your network? It's surprising, but many people do not follow common sense and simple logic when analyzing malicious network activity. Even worse, when contacting other organizations to complain, security incidents can be misrepresented because all of the facts are not in order, incorrect or even erroneous theories. This paper details a variety of steps that you can take to get the most effectiveness and accuracy from your intrusion detection system. It also concentrates on determining the who, what, why, where, when and how of any network security event so that you can accurately relay this information to others."

tags | paper
MD5 | 1a94f2883abc9c8b8710feb7235429c4
probes.txt
Posted Aug 17, 1999
Authored by Ron Gula

"How to Handle and Identify Network Probes" - "Do you know what to do when suspicious network probes are detected on your network? It's surprising, but many people do not follow common sense and simple logic when analyzing malicious network activity. Even worse, when contacting other organizations to complain, security incidents can be misrepresented because all of the facts are not in order, incorrect or even erroneous theories. This paper details a variety of steps that you can take to get the most effectiveness and accuracy from your intrusion detection system. It also concentrates on determining the who, what, why, where, when and how of any network security event so that you can accurately relay this information to others."

tags | paper
MD5 | 90798ed573421fc631cb8be7398892a3
rules.of.engagement.txt
Posted Aug 17, 1999
Authored by Winn Schwartau

The rules of engagement: Testing the security of your enterprise - Very good basic checklist/description related to security assessments - the section on Attack Methodologies is good standard info. Short, but sweet.

tags | paper
MD5 | d9a874c3a8eee0ce52773017279f3614
securityfocus.txt
Posted Aug 17, 1999

Security Focus - This is definitely the most exciting news I've receivved in months. So what is "Security Focus"? In addition to being the new home for the BUGTRAQ mailing list, there will be about a dozen other security-related mailing lists / forums, a huge vulnerability database, products, services, books, papers, articles, tools, news, security resources, event calendars, and much, much more. Security Focus promises to be one hell of a resource.

tags | paper
MD5 | ea0856f9eb2a9d7abe773d818c7b0654
theguide.txt
Posted Aug 17, 1999

No information is available for this file.

tags | paper
MD5 | 841cf59d7a5f4958ed3a1bf03dba09ff
Page 1 of 8
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
NYPD Cops Need A Warrant To Snoop On Your Phone
Posted Nov 17, 2017

tags | headline, government, privacy, usa, phone
Oracle Scrambles To Fix Security Flaws In Tuxedo
Posted Nov 17, 2017

tags | headline, database, flaw, oracle
Github To Devs: Now You'll Get Security Alerts On Flaws In Popular Software Libraries
Posted Nov 17, 2017

tags | headline, flaw
Keystone Pipeline Leaked 210,000 Gallons Of Oil In South Dakota
Posted Nov 17, 2017

tags | headline, flaw
Cash Converters Reveals Data Breach
Posted Nov 16, 2017

tags | headline, hacker, cybercrime, data loss, fraud, identity theft
Kaspersky Defends Its Role In NSA Breach
Posted Nov 16, 2017

tags | headline, government, malware, usa, russia, data loss, spyware, nsa
McAfee Anti-Hacking Service Exposed Users To Banking Malware
Posted Nov 16, 2017

tags | headline, malware, bank, cybercrime, fraud, flaw, identity theft, mcafee
DJI Bug Bounty NDA Is 'Not Signable', Say Irate Infosec Researchers
Posted Nov 16, 2017

tags | headline, hacker, flaw
Government Just Figures Out You Can Hack Planes Remotely Due To Poor Design
Posted Nov 15, 2017

tags | headline, government, usa, flaw, terror
UK Security Chief Blames Russia For Hacks
Posted Nov 15, 2017

tags | headline, hacker, government, britain, russia, cyberwar
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close