what you don't know can hurt you
Showing 1 - 5 of 5 RSS Feed

Files from Coretez Giovanni

First Active2000-02-23
Last Active2001-03-20
stick.tgz
Posted Mar 20, 2001
Authored by Coretez Giovanni | Site eurocompton.net

Stick is a distributed denial of service attack which targets IDS systems. It takes a snort rule file as input. Binary distribution.

tags | denial of service
MD5 | 453b280e24ece40bd1f9837bd2d12f9b
TopologyDOS.pdf
Posted Jul 12, 2000
Authored by Coretez Giovanni | Site 8thport.com

This paper re-examines the denial-of-service issue. It looks at the techniques used to accomplish denial of service including process recovery, resource destruction (crash), and resource overload. Looking at how DOS functions allows for the design of other DOS attacks aimed at the processes used by the operating system, the network protocols and the users.

tags | paper, denial of service, protocol
MD5 | 690a78612efc13f42762b3aaa8fca700
PassiveMappingviaStimulus.pdf
Posted Jun 26, 2000
Authored by Coretez Giovanni | Site 8thport.com

Passive Mapping: The Importance of Stimulus - This paper is a follow-on to the first Passive Mapping paper. It examines the difference between active and passive mapping and gives some examples of how this difference can be implemented.

tags | paper
MD5 | dafefead7021248954b91fcc6d33137d
OffensiveUseofIDS.pdf
Posted Jun 26, 2000
Authored by Coretez Giovanni | Site 8thport.com

Offensive Use of IDS - This paper explores ways Intrusion Detection Systems (IDS) can be used for offensive purposes. It gives a brief technical outline of determining which TCP services are running on a network using passive monitoring.

tags | paper, tcp
MD5 | 2ea691ce01ff4f3fb49226b16ebffac4
MiddleMan.pdf
Posted Feb 23, 2000
Authored by Coretez Giovanni | Site 8thport.com

Paper explaining man-in-the-middle attacks, using a secure web connection as an example.

tags | paper, web
MD5 | 973f3acfc65b90435e2c51884eef8682
Page 1 of 1
Back1Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close