搜索资源列表
用于模拟GETPOST方法发送HTTP请求并取得数据
- 用于模拟GETPOST方法发送HTTP请求并取得数据.可能用于网络攻击-GETPOST simulation methods for sending HTTP request and obtain data. May be used in network attacks
syncookie200503080000.tar
- 一个简单linux环境下SYN FLOOD攻击的针对网络的syn cookie实现程序,支持网桥和转发模式.-a simple linux environment SYN FLOOD attacks against network syn cookie procedures, support the bridge and forward mode.
缓冲区溢出攻防
- 本代码演示了缓冲区溢出的攻击与防范。我的开发环境 操作系统:windows xp professional + sp1a 编译器:visual c++.net 2003 由于操作系统的补丁太多,即使与我相同的系统也可能需要修改LoadLibrary、GetProcAddress、VirtualAlloc和\"jmp esp\"指令的地址。 请谨慎修改编译参数,修改参数可能导致修改程序。 请只编译release版,debug版无法正常执行。-demonstratio
C++实现网络嗅探器
- 网络嗅探器无论是在网络安全还是在黑客攻击方面均扮演了很重要的角色。通过使用网络嗅探器可以把网卡设置于混杂模式,并可实现对网络上传输的数据包的捕获与分析。-Sniffer network is the network security or hacker attacks are playing a very important role. Through the use of Sniffer network card can be installed in mixed mode, enabling
rainbowcrack-1.2-src
- Rainbow加密算法的Crack程序,支持字典攻击。-Rainbow Crack Encryption Algorithm procedures, support dictionary attacks.
Libnidsdetect
- 利用Libnids开发包设计的检测攻击的源代码-use Libnids development kits designed detection of the source code attacks
personal_firewall
- 个人实现的一个简单的个人防火墙,可以抵抗基本常规的网络攻击,适合初学者学习。-personal realization of a simple personal firewall, protecting basic conventional network attacks, for beginners learning.
bcccc
- 关于水印问题的嵌入,提取,攻击。不知道有没有帮助。-on the watermark embedding and extraction, attacks. Do any help.
multithread_dos_attak_sourcecode
- 多线程dos攻击程序源代码,希望对大家有所帮助-multithreading dos attacks source code, we hope to help
Wormhole_Simulation_Code
- This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
差分攻击
- 用差分方法攻击加密文件,试图获得密钥。演示程序,只分析基于SDES加密的文件。请仔细阅读内附的说明文件。-difference method using encryption attacks, attempts to obtain keys. Demo program, based on the analysis of only SDES encrypted file. Please read the attached note.
DESCrack
- DES查分攻击源代码,包含DES算法的实现以及DES密码的查分攻击。-DES check points attacks source code contains the DES algorithm realization of the investigation DES-attack.
udpflood
- 洪水攻击范例——用于教学,适用于初学者用-flood attacks example -- for teaching beginners to use
tfn2k.rar
- DOS攻击源码,有smurf攻击、SYN FLOOd攻击等,仅供学习研究之用,不可用于违背他人利益,DOS attack source, there are smurf attacks, SYN FLOOd attacks, for study purposes, not for others, contrary to the interests of
SQL-Injection-Attacks-and-Defense
- SQL注入攻击与防御(英文版),唯一一本关于SQL注入攻击与防御的专业书籍。理解,发现、利用和防御SQL注入的最佳指导。见解精辟,丰富、精彩的SQL注入示例及防御策略。作者多年长期实践经验的总结。-SQL Injection Attacks and Defense (English), only one of the books on SQL injection attacks and defense. Understanding, found that the best defense aga
2008---A-Review-of-Current-Routing-Attacks-in-Mob
- 2008 - A Review of Current Routing Attacks in Mobile Ad Hoc Networks
2011---A-Survey-on-Attacks-and-Defense-Metrics-of
- 2011 - A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks
Denial-of-Service-Attacks-in-Wireless-Networks-AB
- Denial of Service Attacks in Wireless Networks
Common-PHP-attacks-analysis-
- PHP程序的常见漏洞攻击分析 Common Vulnerabilities PHP program analysis attacks-Common Vulnerabilities PHP program analysis attacks
Analysis-of-IP-fragment--attacks
- 本文对linux的IP组装算法进行了分析,因为IP碎片经常用于DOS等攻击,在文章后面我结合了一些攻击方法进行了更进一步的说明 -In this paper, the IP linux assembly algorithm analysis, because the IP fragments are often used in attacks such as DOS, later in the article I combine several attack methods are furt