Mstream, the newest of DDoS tools to be circulated, has been analyzed and has been found to be more primitive than any of the other DDoS tools available. Examination of reverse engineered and recovered C source code reveals the program to be in early development stages, with numerous bugs and an incomplete feature set compared with any of the other listed tools. The effectiveness of the stream/stream2 attack itself, however, means that it will still be disruptive to the victim (and agent) networks even with an attack network consisting of only a handfull of agents.
f99e0a8ce4955dd57c4447e0fb53ba79f318ed5fd1ecacfd76efa2782fd75770
This source code, once compiled, can be used to toy with a system's syslogd. Note: syslogd must be running with the -r option on Linux, or -u on BSD.
3e33443698d216d8305123c81221599b237541fe9f6f5ab917ce91785f6542e4
A backdoor over non connected and spoofed tcp packets.
42a0382fb0ddc459d356d9fd22b1b33b6f0f4541745ae1cb4ba8e6c78bb94aa7
Remote Password Assassin (RPA) is a powerful security tool to test passwords across networks. In a simple way, RPA is a Network Password Cracker using Brute Force Attack and able to attack very common ports on servers. When RPA is finish it will generate a HTML report, easy to follow and detailing the session.
2cc88d0245ab03bb24ea1ab6584cdd23f4580dc58e7144d252346de1c4763510
Bog Issue 4 - The Complete Guide to the Elcotel Payphone, hax0ring the Gibson, the complete 0wnage guide, IRC Quotes, and more.
ace18a2dc8fa0dc576f66431d51ec8721072ae4e8087fe62d1053efc8ffeda2c
mstream, a DDoS tool. It's been alleged that this source code, once compiled, was used by persons unknown in the distributed denial of service (DDoS) attacks earlier this year. Obviously such a thing cannot be confirmed aside from through a process of targeted sites making an appropriate comparison between the traffic this software would generate and the traffic they actually received. Submitted Anonymously.
aba6aafe2ecd69a7d502deb4ed65f8fe1aa609356e823945d6cc74e96ec82c2d
Nmap is a utility for network exploration or security auditing. Nmap 2.51 has been released, mostly to fix a target parsing bug found by Steve Horsburgh which could in some cases cause Nmap to crash with the error "Assertion 't->nleft > 1' failed". It supports ping scanning (determine which hosts are up), many port scanning techniques (determine what services the hosts are offering), and TCP/IP fingerprinting (remote host operating system identification). Nmap also offers flexible target and port specification, decoy scanning, determination of TCP sequence predictability characteristics, sunRPC scanning, reverse-identd scanning, and more.
7d695085b3bde81c8d2ae10b2c4b26e00f3518ecc1e22aae78169e6596a35ffd