exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2000-05-01

Mstream_Analysis.txt
Posted May 1, 2000
Authored by David Dittrich

Mstream, the newest of DDoS tools to be circulated, has been analyzed and has been found to be more primitive than any of the other DDoS tools available. Examination of reverse engineered and recovered C source code reveals the program to be in early development stages, with numerous bugs and an incomplete feature set compared with any of the other listed tools. The effectiveness of the stream/stream2 attack itself, however, means that it will still be disruptive to the victim (and agent) networks even with an attack network consisting of only a handfull of agents.

tags | denial of service
SHA-256 | f99e0a8ce4955dd57c4447e0fb53ba79f318ed5fd1ecacfd76efa2782fd75770
syslogd-DoS.c
Posted May 1, 2000
Authored by Lore

This source code, once compiled, can be used to toy with a system's syslogd. Note: syslogd must be running with the -r option on Linux, or -u on BSD.

tags | denial of service
systems | linux, bsd
SHA-256 | 3e33443698d216d8305123c81221599b237541fe9f6f5ab917ce91785f6542e4
tcpb.c
Posted May 1, 2000
Authored by Cyrax | Site programmazione.it

A backdoor over non connected and spoofed tcp packets.

tags | exploit, spoof, tcp
SHA-256 | 42a0382fb0ddc459d356d9fd22b1b33b6f0f4541745ae1cb4ba8e6c78bb94aa7
RLRPAconv1.0.tar.gz
Posted May 1, 2000
Site roses-labs.com

Remote Password Assassin (RPA) is a powerful security tool to test passwords across networks. In a simple way, RPA is a Network Password Cracker using Brute Force Attack and able to attack very common ports on servers. When RPA is finish it will generate a HTML report, easy to follow and detailing the session.

tags | remote, cracker
SHA-256 | 2cc88d0245ab03bb24ea1ab6584cdd23f4580dc58e7144d252346de1c4763510
b0g-4.txt
Posted May 1, 2000
Authored by b0g | Site b0g.org

Bog Issue 4 - The Complete Guide to the Elcotel Payphone, hax0ring the Gibson, the complete 0wnage guide, IRC Quotes, and more.

tags | magazine
SHA-256 | ace18a2dc8fa0dc576f66431d51ec8721072ae4e8087fe62d1053efc8ffeda2c
mstream.txt
Posted May 1, 2000

mstream, a DDoS tool. It's been alleged that this source code, once compiled, was used by persons unknown in the distributed denial of service (DDoS) attacks earlier this year. Obviously such a thing cannot be confirmed aside from through a process of targeted sites making an appropriate comparison between the traffic this software would generate and the traffic they actually received. Submitted Anonymously.

tags | denial of service
SHA-256 | aba6aafe2ecd69a7d502deb4ed65f8fe1aa609356e823945d6cc74e96ec82c2d
Nmap Scanning Utility 2.51
Posted May 1, 2000
Authored by Fyodor | Site insecure.org

Nmap is a utility for network exploration or security auditing. Nmap 2.51 has been released, mostly to fix a target parsing bug found by Steve Horsburgh which could in some cases cause Nmap to crash with the error "Assertion 't->nleft > 1' failed". It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.

tags | tool, remote, tcp, nmap
systems | unix
SHA-256 | 7d695085b3bde81c8d2ae10b2c4b26e00f3518ecc1e22aae78169e6596a35ffd
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close