exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Gadi Evron

Email addressge at linuxbox.org
First Active2006-02-13
Last Active2009-06-24
7th Internet Security Operations And Intelligence Call For Papers
Posted Jun 24, 2009
Authored by Gadi Evron | Site isotf.org

The seventh Internet Security Operations and Intelligence (ISOI) will take place on September 17th and 18th, 2009, in San Diego, California. Proposals for presentations are being solicited from the public.

tags | paper, conference
SHA-256 | 37e542de574423886cd26a97dad74f48685ca4c985e441f791e716155b55aa87
trsec2007-cfp.txt
Posted Aug 8, 2007
Authored by Gadi Evron

Call For Papers for the TRsec conference which will be held September 8th, 2007 in Istanbul, turkey.

tags | paper, conference
SHA-256 | 30a72ba2d8d51978e55f377ee185c8181e6c2179aeb9d94c9fdf9bf517de1f9b
team-evil-incident.pdf
Posted Jul 20, 2006
Authored by Gadi Evron, Kfir Damari, Ami Chayun | Site beyondsecurity.com

Analysis whitepaper detailing Cyber-terrorism defacement attacks on pro-Israeli servers by Team Evil.

tags | paper
SHA-256 | b5c0b1a8f42634e6f235bab6d79b65c54bd1315b316a4aad456f35821a58aaa9
DA-CFP-2006.txt
Posted Jul 9, 2006
Authored by Gadi Evron

Call For Papers for the DA (Drone Armies) Workshop. This workshop is for the purpose of bringing together members of the DA and MWP operational communities to share information, as well as plan future operations. It will be held August 10, 2006 in San Jose, California.

tags | paper, conference
SHA-256 | e2a57bdc99e80e91623c9bb37e2017701d3921b22f69fc2b33c8de6399226425
DNS-Amplification-Attacks.pdf
Posted Mar 22, 2006
Authored by Gadi Evron | Site isotf.org

This paper outlines a Distributed Denial of Service (DDoS) attack which abuses open recursive Domain Name System (DNS) name servers using spoofed UDP packets. A network analysis of one of these attacks is looked at in detail.

tags | paper, denial of service, udp, spoof
SHA-256 | 3f4668679ef95860c66856b62884f8dbb32079765e1a7b9e0c0e4d1653bf2ad4
commentspam.txt
Posted Feb 13, 2006
Authored by Gadi Evron | Site blogs.securiteam.com

Interesting paper relating to techniques of detecting and countering comment spam on blogs.

tags | paper
SHA-256 | 404eb47431c4bd663b509e3eb68659620cbc32940819533e7c69f579aaf3ebd0
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close