Twenty Year Anniversary
Showing 1 - 5 of 5 RSS Feed

Files from Coretez Giovanni

First Active2000-02-23
Last Active2001-03-20
stick.tgz
Posted Mar 20, 2001
Authored by Coretez Giovanni | Site eurocompton.net

Stick is a distributed denial of service attack which targets IDS systems. It takes a snort rule file as input. Binary distribution.

tags | denial of service
MD5 | 453b280e24ece40bd1f9837bd2d12f9b
TopologyDOS.pdf
Posted Jul 12, 2000
Authored by Coretez Giovanni | Site 8thport.com

This paper re-examines the denial-of-service issue. It looks at the techniques used to accomplish denial of service including process recovery, resource destruction (crash), and resource overload. Looking at how DOS functions allows for the design of other DOS attacks aimed at the processes used by the operating system, the network protocols and the users.

tags | paper, denial of service, protocol
MD5 | 690a78612efc13f42762b3aaa8fca700
PassiveMappingviaStimulus.pdf
Posted Jun 26, 2000
Authored by Coretez Giovanni | Site 8thport.com

Passive Mapping: The Importance of Stimulus - This paper is a follow-on to the first Passive Mapping paper. It examines the difference between active and passive mapping and gives some examples of how this difference can be implemented.

tags | paper
MD5 | dafefead7021248954b91fcc6d33137d
OffensiveUseofIDS.pdf
Posted Jun 26, 2000
Authored by Coretez Giovanni | Site 8thport.com

Offensive Use of IDS - This paper explores ways Intrusion Detection Systems (IDS) can be used for offensive purposes. It gives a brief technical outline of determining which TCP services are running on a network using passive monitoring.

tags | paper, tcp
MD5 | 2ea691ce01ff4f3fb49226b16ebffac4
MiddleMan.pdf
Posted Feb 23, 2000
Authored by Coretez Giovanni | Site 8thport.com

Paper explaining man-in-the-middle attacks, using a secure web connection as an example.

tags | paper, web
MD5 | 973f3acfc65b90435e2c51884eef8682
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    14 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close