Jump to content

Packet Storm: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0
remove unknown parameter from infobox
Line 1: Line 1:
{{Infobox website
{{Infobox website
| name = Packet Storm
| name = Packet Storm
| favicon =
| url = {{URL|https://packetstormsecurity.com/}}
| logo =
| screenshot =
| caption =
| url = [http://packetstormsecurity.com/ packetstormsecurity.com]
| alexa = {{DecreasePositive}} 37,406 ({{as of|2014|4|1|alt=April 2014}})<ref name="alexa">{{cite web|url= http://www.alexa.com/siteinfo/packetstormsecurity.org |title= Packetstormsecurity.org Site Info | publisher= [[Alexa Internet]] |accessdate= 2014-04-01 }}</ref><!--Updated monthly by OKBot.-->
| commercial = Yes
| commercial = Yes
| type = [[Computer Security]]
| type = [[Computer security]]
| registration =
| owner =
| author = The Packet Storm Team
| author = The Packet Storm Team
| launch_date = 1998
| launch_date = {{Start date and age|1998}}
| current_status =
| revenue =
}}
}}


'''Packet Storm Security''' is a popular information security [[website]] offering current and historical [[computer security]] tools,<ref>{{cite web | url=http://www.informationweek.com/news/software/infrastructure/showArticle.jhtml?articleID=210201115 | title=Linux Systems Being Hit By SSH-Key Attacks | publisher=informationweek.com | accessdate=2008-08-27}}</ref> [[exploit (computer security)|exploit]]s,<ref>{{cite web | url=http://www.infoworld.com/d/security-central/compiling-exploit-code-network-security-must-417 | title=Compiling Exploit Code: A Network-Security Must | publisher=infoworld.com | accessdate=2006-03-24}}</ref> and security advisories. It is operated by a group of security enthusiasts that publish new security information<ref>{{cite web | url=http://www.infoworld.com/d/security-central/mozilla-claims-firefox-15-hole-poses-minor-risk-628 | title=Mozilla Claims Firefox 1.5 Hole Poses Minor Risk | publisher=infoworld.com | accessdate=2005-12-08}}</ref> and offer tools for educational and testing purposes.<ref>{{cite web | url=http://www.packetstormsecurity.com/about/ | title=About Packet Storm | publisher=packetstormsecurity.com | accessdate=2009-12-06}}</ref>
'''Packet Storm Security''' is an [[information security]] [[website]] offering current and historical [[computer security]] tools,<ref>{{cite web | url=http://www.informationweek.com/news/software/infrastructure/showArticle.jhtml?articleID=210201115 | title=Linux Systems Being Hit By SSH-Key Attacks | publisher=informationweek.com | accessdate=2008-08-27}}</ref> [[exploit (computer security)|exploit]]s,<ref>{{cite web | url=http://www.infoworld.com/d/security-central/compiling-exploit-code-network-security-must-417 | title=Compiling Exploit Code: A Network-Security Must | publisher=infoworld.com | accessdate=2006-03-24}}</ref> and security advisories. It is operated by a group of security enthusiasts that publish new security information<ref>{{cite web | url=http://www.infoworld.com/d/security-central/mozilla-claims-firefox-15-hole-poses-minor-risk-628 | title=Mozilla Claims Firefox 1.5 Hole Poses Minor Risk | publisher=infoworld.com | accessdate=2005-12-08}}</ref> and offer tools for educational and testing purposes.<ref>{{cite web | url=http://www.packetstormsecurity.com/about/ | title=About Packet Storm | publisher=packetstormsecurity.com | accessdate=2009-12-06}}</ref>


==Overview==
==Overview==
Line 25: Line 16:


==References==
==References==
{{Reflist|30em}}
{{Reflist}}


==External links==
==External links==
*{{official website|http://packetstormsecurity.com}}
*{{official website|https://packetstormsecurity.com/}}


[[Category:Computer security organizations]]
[[Category:Computer security organizations]]
[[Category:Computer network security]]
[[Category:Computer network security]]
[[Category:Internet properties established in 1998]]

Revision as of 05:14, 29 November 2020

Packet Storm
Type of site
Computer security
Created byThe Packet Storm Team
URLpacketstormsecurity.com
CommercialYes
Launched1998; 26 years ago (1998)

Packet Storm Security is an information security website offering current and historical computer security tools,[1] exploits,[2] and security advisories. It is operated by a group of security enthusiasts that publish new security information[3] and offer tools for educational and testing purposes.[4]

Overview

The site was originally created by Ken Williams who sold it in 1999 to Kroll O'Gara[5] and just over a year later, it was given back to the security community.[6] While at Kroll O'Gara, Packet Storm awarded Mixter[7] $10,000 in a whitepaper contest dedicated to the mitigation of distributed denial of service attacks.[8] Today, they offer a suite of consulting services[9] and the site is referenced in hundreds of books.[10]

In 2013, Packet Storm launched a bug bounty program to buy working exploits that would be given back to the community for their own testing purposes.[11][12] Later that year, they worked with a security researcher to help expose a large scale shadow profile issue with the popular Internet site Facebook.[13][14][15][16][17][18] After Facebook claimed that only 6 million people were affected, additional testing by Packet Storm exposed that the numbers were not accurately reported.[19][20][21][22]

References

  1. ^ "Linux Systems Being Hit By SSH-Key Attacks". informationweek.com. Retrieved 2008-08-27.
  2. ^ "Compiling Exploit Code: A Network-Security Must". infoworld.com. Retrieved 2006-03-24.
  3. ^ "Mozilla Claims Firefox 1.5 Hole Poses Minor Risk". infoworld.com. Retrieved 2005-12-08.
  4. ^ "About Packet Storm". packetstormsecurity.com. Retrieved 2009-12-06.
  5. ^ Wayner, Peter (1999-08-17). "Security Firm To Revive Computer-Defense Site". nytimes.com. Retrieved November 14, 2017.
  6. ^ "Packetstorm Rides Again". theregister.co.uk. Retrieved 2001-07-16.
  7. ^ "Hacker Discloses New Internet Attack Software". cnet.com. Retrieved 2017-11-14.
  8. ^ "Security Websites Hit By Big DDoS Attack". informationweek.com. Retrieved 2009-02-10.
  9. ^ "Packet Storm Security Consulting". packetstormsecurity.com. Retrieved 2013-07-17.
  10. ^ "Packet Storm Search In Google Books". google.com. Retrieved 2013-07-17.
  11. ^ "Did ZDI snub your 0-day attack? Packet Storm will buy it for $7k". theregister.co.uk. Retrieved 2013-01-18.
  12. ^ "Packetstorm opens bug bounty programme with $7,000 top reward". v3.co.uk. Retrieved 2013-01-16.
  13. ^ "Firm: Facebook's shadow profiles are 'frightening' dossiers on everyone". zdnet.com. Retrieved 2013-07-17.
  14. ^ "Anger mounts after Facebook's 'shadow profiles' leak in bug". zdnet.com. Retrieved 2013-07-17.
  15. ^ "Facebook's Creepy Data-Grabbing Ways Make It The Borg Of The Digital World". techcrunch.com. Retrieved 2013-07-17.
  16. ^ "Facebook 'dossier' find raises contact list privacy questions". csoonline.com. Retrieved 2013-07-17.
  17. ^ "Facebook Login, Home, Friends, Search: Company Accused of Leaving Out Important Details in Information Leak Scandal". designntrend.com. Archived from the original on 2013-07-04. Retrieved 2013-07-17.
  18. ^ "With Friends Like These". slate.com. Retrieved 2013-07-17.
  19. ^ "Facebook: Math Of The Aftermath". packetstormsecurity.com. Retrieved 2013-07-17.
  20. ^ Guarini, Drew (2013-06-27). "Experts Says Facebook Leak Of 6 Million Users' Data Might Be Bigger Than We Thought". huffingtonpost.com. Retrieved 2013-07-17.
  21. ^ "Firm: Facebook 'bug' worse than reported; non-users also affected". zdnet.com. Retrieved 2013-07-17.
  22. ^ "Facebook Bug Leaked More Info Than Company Reported?". net-security.org. Retrieved 2013-07-17.