Packet Storm: Difference between revisions
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0 |
remove unknown parameter from infobox |
||
Line 1: | Line 1: | ||
{{Infobox website |
{{Infobox website |
||
| name = Packet Storm |
| name = Packet Storm |
||
| |
| url = {{URL|https://packetstormsecurity.com/}} |
||
| logo = |
|||
| screenshot = |
|||
| caption = |
|||
| url = [http://packetstormsecurity.com/ packetstormsecurity.com] |
|||
| alexa = {{DecreasePositive}} 37,406 ({{as of|2014|4|1|alt=April 2014}})<ref name="alexa">{{cite web|url= http://www.alexa.com/siteinfo/packetstormsecurity.org |title= Packetstormsecurity.org Site Info | publisher= [[Alexa Internet]] |accessdate= 2014-04-01 }}</ref><!--Updated monthly by OKBot.--> |
|||
| commercial = Yes |
| commercial = Yes |
||
| type = [[Computer |
| type = [[Computer security]] |
||
| registration = |
|||
| owner = |
|||
| author = The Packet Storm Team |
| author = The Packet Storm Team |
||
| launch_date = 1998 |
| launch_date = {{Start date and age|1998}} |
||
| current_status = |
|||
| revenue = |
|||
}} |
}} |
||
'''Packet Storm Security''' is |
'''Packet Storm Security''' is an [[information security]] [[website]] offering current and historical [[computer security]] tools,<ref>{{cite web | url=http://www.informationweek.com/news/software/infrastructure/showArticle.jhtml?articleID=210201115 | title=Linux Systems Being Hit By SSH-Key Attacks | publisher=informationweek.com | accessdate=2008-08-27}}</ref> [[exploit (computer security)|exploit]]s,<ref>{{cite web | url=http://www.infoworld.com/d/security-central/compiling-exploit-code-network-security-must-417 | title=Compiling Exploit Code: A Network-Security Must | publisher=infoworld.com | accessdate=2006-03-24}}</ref> and security advisories. It is operated by a group of security enthusiasts that publish new security information<ref>{{cite web | url=http://www.infoworld.com/d/security-central/mozilla-claims-firefox-15-hole-poses-minor-risk-628 | title=Mozilla Claims Firefox 1.5 Hole Poses Minor Risk | publisher=infoworld.com | accessdate=2005-12-08}}</ref> and offer tools for educational and testing purposes.<ref>{{cite web | url=http://www.packetstormsecurity.com/about/ | title=About Packet Storm | publisher=packetstormsecurity.com | accessdate=2009-12-06}}</ref> |
||
==Overview== |
==Overview== |
||
Line 25: | Line 16: | ||
==References== |
==References== |
||
{{Reflist |
{{Reflist}} |
||
==External links== |
==External links== |
||
*{{official website| |
*{{official website|https://packetstormsecurity.com/}} |
||
[[Category:Computer security organizations]] |
[[Category:Computer security organizations]] |
||
[[Category:Computer network security]] |
[[Category:Computer network security]] |
||
[[Category:Internet properties established in 1998]] |
Revision as of 05:14, 29 November 2020
Type of site | Computer security |
---|---|
Created by | The Packet Storm Team |
URL | packetstormsecurity |
Commercial | Yes |
Launched | 1998 |
Packet Storm Security is an information security website offering current and historical computer security tools,[1] exploits,[2] and security advisories. It is operated by a group of security enthusiasts that publish new security information[3] and offer tools for educational and testing purposes.[4]
Overview
The site was originally created by Ken Williams who sold it in 1999 to Kroll O'Gara[5] and just over a year later, it was given back to the security community.[6] While at Kroll O'Gara, Packet Storm awarded Mixter[7] $10,000 in a whitepaper contest dedicated to the mitigation of distributed denial of service attacks.[8] Today, they offer a suite of consulting services[9] and the site is referenced in hundreds of books.[10]
In 2013, Packet Storm launched a bug bounty program to buy working exploits that would be given back to the community for their own testing purposes.[11][12] Later that year, they worked with a security researcher to help expose a large scale shadow profile issue with the popular Internet site Facebook.[13][14][15][16][17][18] After Facebook claimed that only 6 million people were affected, additional testing by Packet Storm exposed that the numbers were not accurately reported.[19][20][21][22]
References
- ^ "Linux Systems Being Hit By SSH-Key Attacks". informationweek.com. Retrieved 2008-08-27.
- ^ "Compiling Exploit Code: A Network-Security Must". infoworld.com. Retrieved 2006-03-24.
- ^ "Mozilla Claims Firefox 1.5 Hole Poses Minor Risk". infoworld.com. Retrieved 2005-12-08.
- ^ "About Packet Storm". packetstormsecurity.com. Retrieved 2009-12-06.
- ^ Wayner, Peter (1999-08-17). "Security Firm To Revive Computer-Defense Site". nytimes.com. Retrieved November 14, 2017.
- ^ "Packetstorm Rides Again". theregister.co.uk. Retrieved 2001-07-16.
- ^ "Hacker Discloses New Internet Attack Software". cnet.com. Retrieved 2017-11-14.
- ^ "Security Websites Hit By Big DDoS Attack". informationweek.com. Retrieved 2009-02-10.
- ^ "Packet Storm Security Consulting". packetstormsecurity.com. Retrieved 2013-07-17.
- ^ "Packet Storm Search In Google Books". google.com. Retrieved 2013-07-17.
- ^ "Did ZDI snub your 0-day attack? Packet Storm will buy it for $7k". theregister.co.uk. Retrieved 2013-01-18.
- ^ "Packetstorm opens bug bounty programme with $7,000 top reward". v3.co.uk. Retrieved 2013-01-16.
- ^ "Firm: Facebook's shadow profiles are 'frightening' dossiers on everyone". zdnet.com. Retrieved 2013-07-17.
- ^ "Anger mounts after Facebook's 'shadow profiles' leak in bug". zdnet.com. Retrieved 2013-07-17.
- ^ "Facebook's Creepy Data-Grabbing Ways Make It The Borg Of The Digital World". techcrunch.com. Retrieved 2013-07-17.
- ^ "Facebook 'dossier' find raises contact list privacy questions". csoonline.com. Retrieved 2013-07-17.
- ^ "Facebook Login, Home, Friends, Search: Company Accused of Leaving Out Important Details in Information Leak Scandal". designntrend.com. Archived from the original on 2013-07-04. Retrieved 2013-07-17.
- ^ "With Friends Like These". slate.com. Retrieved 2013-07-17.
- ^ "Facebook: Math Of The Aftermath". packetstormsecurity.com. Retrieved 2013-07-17.
- ^ Guarini, Drew (2013-06-27). "Experts Says Facebook Leak Of 6 Million Users' Data Might Be Bigger Than We Thought". huffingtonpost.com. Retrieved 2013-07-17.
- ^ "Firm: Facebook 'bug' worse than reported; non-users also affected". zdnet.com. Retrieved 2013-07-17.
- ^ "Facebook Bug Leaked More Info Than Company Reported?". net-security.org. Retrieved 2013-07-17.