Stick is a distributed denial of service attack which targets IDS systems. It takes a snort rule file as input. Binary distribution.
89ef57709270ee0e91c6187ac1f214db2ab67e8d4fa823aa1fe5020290150c79
This paper re-examines the denial-of-service issue. It looks at the techniques used to accomplish denial of service including process recovery, resource destruction (crash), and resource overload. Looking at how DOS functions allows for the design of other DOS attacks aimed at the processes used by the operating system, the network protocols and the users.
a9ad3a5877fc1dae59b4e631b8e55e3f39c02254ab7704ea871612315b0770e4
Passive Mapping: The Importance of Stimulus - This paper is a follow-on to the first Passive Mapping paper. It examines the difference between active and passive mapping and gives some examples of how this difference can be implemented.
b7aee3df2ecda88f78698e55edb61103bf3a24346cb9a3ab238c14fbe4837b5d
Offensive Use of IDS - This paper explores ways Intrusion Detection Systems (IDS) can be used for offensive purposes. It gives a brief technical outline of determining which TCP services are running on a network using passive monitoring.
5afe13e0d8a24ba3581c61da0bde82429b9bc4336ab887010dcf199a7ad71979
Paper explaining man-in-the-middle attacks, using a secure web connection as an example.
e133e7778ec82962f986820746e4d99c549bec2941a5f9f34c67ad18059944a3