exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files

code.review.html
Posted Nov 4, 2003

Security Code Review Guidelines

tags | paper
SHA-256 | 187abefd2333cdc9281a85c2b342ca0969f512e1c3675ee036f6c28f8da35071
An Overview of Raw Socket Programming with FreeBSD
Posted Jul 20, 2003
Authored by Burebista, clau | Site reversedhell.net

A very thorough and well written paper describing raw socket programming entitled "An overview of raw socket programming with FreeBSD - Chapter I: Transport Control Protocol".

tags | paper, protocol
systems | freebsd
SHA-256 | 5328dd0dea4544d1c2163bdee82fd29da1afc5e35ff3273f7f5a411e490c6288
sbfprint.txt
Posted Apr 3, 2003
Authored by Necrose | Site truncode.org

Service Banner Fingerprinting in C - This paper is a supplement to modular's tcpscan series. It covers how to write C programs that will perform banner fingerprinting using various standard servers as examples.

tags | paper
SHA-256 | e235c26539ac8a622e503b130f1fea2dec6c57ae8c0f9b6cd3ed0564bfe69c95
tcpscan3.txt
Posted Feb 21, 2003
Authored by Modular | Site truncode.org

Coding a TCP Connect Port Scanner Using VLSM - Handbook three in a series. An in-depth beginners tutorial written to explain incorporation of VLSM and CIDR capabilities into a network scanner.

tags | paper, tcp
SHA-256 | 37beb0c660c6d22bad13b4a8d700e977e49e7010171643b7a25dbf35c1cb6012
coding-with-the-dns-protocol.txt
Posted Sep 15, 2000
Authored by JimJones | Site zsh.interniq.org

Coding with the DNS protocol v2 - Includes DNS basics, How to decode DNS packets by hand, Parsing DNS replies, advanced DNS techniques, and DNS Security Mechanisms. Well written, contains lots of in depth information and example code.

tags | paper, protocol
SHA-256 | 4dd89f0ca3b69db69a2564df1a08db8f2c87d8bfc8d824966fcf1f0bf5dd7a76
raw_socket.txt
Posted May 22, 2000
Authored by Nitr0gen | Site exile2k.org

Exile 2000 International Coding Team. Documentation about native raw socket programming.

tags | paper
SHA-256 | ca82664b05cae82e6ef3f5ce15318146d5dd3596467fc2c0dd90043411341f95
ElectricFence-2.2.2.tar.gz
Posted Feb 17, 2000
Authored by Bruce Perens | Site perens.com

Electric Fence stops your program on the exact instruction that overruns (or underruns) a malloc() memory buffer. GDB will then display the source-code line that causes the bug. It works by using the virtual-memory hardware to create a red-zone at the border of each buffer - touch that, and your program stops. Catch all of those formerly impossible-to-catch overrun bugs that have been bothering you for years.

Changes: Fixed shared library to be position-independent code.
tags | paper, overflow
SHA-256 | e5be3a38a0d2b71ba558eb310a2db44ea6e7c208e16d4fd907dc6ed11c46b1a7
EasyTcpIp-lib-0.4.tar.gz
Posted Nov 15, 1999
Authored by Marcelo Gornstein | Site members.xoom.com

Easy TcpIp Library adds basic TCP/UDP/ICMP/IP support to your applications by simply linking it in. You can write servers, clients, send/receive data and send/receive/dump/analyze packets.

Changes: Support for packet-forging, and a major code rewrite.
tags | paper, udp, tcp
SHA-256 | a429380d33f5e21aebe644edcccbe0c6b1660254f495910297cd42668be11ee6
EasyTcpIp-lib-0.2.tar.gz
Posted Oct 22, 1999
Authored by Marcelo Gornstein

Easy TcpIp Library is useful to add basic TCP/IP support to your applications by simply linking it in.

tags | paper, tcp
SHA-256 | c49cd25eebd1db8f427ebdbdf7fcec255bce3bcdea3f7f433d77f240fa31ee01
1986-loginv12n1.ps
Posted Aug 17, 1999

"How to Write a Setuid Program" M. Bishop

tags | paper
SHA-256 | c6a25468858ef75f20f7a3f29be45870bdda6323c666429c4bd1d8996f9d561a
robust.ps
Posted Aug 17, 1999

"Robust Programming" M. Bishop

tags | paper
SHA-256 | 2e46f8efc139e9fd51c49152041a4569c14775bd26def18400ebdf08cded7f5a
up2lo.sh
Posted Aug 17, 1999

up2lo - rename files from uppercase to lower case.

tags | paper
SHA-256 | f0497c3a160179913a8a3db99ec85cc0f908f6e7344640e85132ac49a2861979
1996-sans-tut.ps
Posted Aug 17, 1999

"UNIX Security: Security in Programming" M. Bishop

tags | paper
systems | unix
SHA-256 | fb294ab479522382c61676f5eb0d997edef95640249e9a9a779dc9d12b9d22d0
1997-ns97.ps
Posted Aug 17, 1999

"Writing Safe Privileged Programs" M. Bishop

tags | paper
SHA-256 | 97207a319d013b1bd518f61f44ec91dea8a8307825e65db02ba9385fde60a3d4
design.secure.software.html
Posted Aug 17, 1999

Designing secure software

tags | paper
SHA-256 | 7ea4b48c6411c2d4ab92386be6cae3f491251b798d326776e87459943ca68e53
secure-faq.html
Posted Aug 17, 1999
Authored by Thamer Al-Herbish

Secure UNIX Programming FAQ v0.5 (html) - This FAQ answers questions about secure programming in the UNIX environment. It is a guide for programmers and not administrators.

tags | paper
systems | unix
SHA-256 | 58936ab74622fab63facbd8736c54a49e72dc451ae713a0657e806eb833d9dcd
secure-faq.txt
Posted Aug 17, 1999
Authored by Thamer Al-Herbish

Secure UNIX Programming FAQ v0.5 (txt) - This FAQ answers questions about secure programming in the UNIX environment. It is a guide for programmers and not administrators.

tags | paper
systems | unix
SHA-256 | ccbd31a12194c1c6809c413ef164945c8055e28f9c9be102d7721c1b2e3da8d8
soktalk1.8.tar
Posted Aug 17, 1999
Authored by Patrick Lambert

Socket Talk v1.8 Net programming tutorial - If you want to learn how to code with sockets, this is the program for you. Socket Talk is a small development environment to mess with sockets. You can send sockets calls and get help on how to code them. X-Window GUI and command line versions included.

tags | paper
SHA-256 | 30d0f0712e0a869135ba92b70ebcfca1ab3286d6664619d86093359beb996807
unix.secure.programming.html
Posted Aug 17, 1999

The Unix Secure Programming FAQ

tags | paper
systems | unix
SHA-256 | b308fbcf9fdf3746d45b770d5c0b9695f189dcd2c5d11121121ed64a90de677b
html-colors.html
Posted Aug 17, 1999

A nice explanation of the use of the RGB triplet or color name.

tags | paper
SHA-256 | 3b3eda657dd5b60776929ddd62c1b3c142e9c8d1fccaad7fb90199dc45daf9c4
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close