搜索资源列表
缓冲区溢出攻防
- 本代码演示了缓冲区溢出的攻击与防范。我的开发环境 操作系统:windows xp professional + sp1a 编译器:visual c++.net 2003 由于操作系统的补丁太多,即使与我相同的系统也可能需要修改LoadLibrary、GetProcAddress、VirtualAlloc和\"jmp esp\"指令的地址。 请谨慎修改编译参数,修改参数可能导致修改程序。 请只编译release版,debug版无法正常执行。-demonstratio
rainbowcrack-1.2-src
- Rainbow加密算法的Crack程序,支持字典攻击。-Rainbow Crack Encryption Algorithm procedures, support dictionary attacks.
Libnidsdetect
- 利用Libnids开发包设计的检测攻击的源代码-use Libnids development kits designed detection of the source code attacks
personal_firewall
- 个人实现的一个简单的个人防火墙,可以抵抗基本常规的网络攻击,适合初学者学习。-personal realization of a simple personal firewall, protecting basic conventional network attacks, for beginners learning.
Wormhole_Simulation_Code
- This code was used to produce simulation results described in: Using Directional Antennas to Prevent Wormhole Attacks Lingxuan Hu and David Evans. Network and Distributed System Security Symposium, San Diego, 5-6 February 2004.
利用聚类算法找出新的攻击
- 利用聚类算法找出新的攻击,属网络安全领域-use clustering algorithm to find new attacks, is a network security
2005322195018
- C语言程序,演示如何通过数组越界进行最简单的缓冲区攻击 -C language program, a demonstration of how the array through the most simple cross-border attacks in the buffer zone
tfn2k.rar
- DOS攻击源码,有smurf攻击、SYN FLOOd攻击等,仅供学习研究之用,不可用于违背他人利益,DOS attack source, there are smurf attacks, SYN FLOOd attacks, for study purposes, not for others, contrary to the interests of
weplab-0.1.5.tar
- Weplab是一个从教育视角审查WEP加密安全性的无线网络工具。它从几次攻击中可以估计出每一个点最小的安全需求。-Weplab is a tool to review the security of WEP encryption in wireless networks from an educational point of view. Several attacks are available so it can be measured the efectiveness and minimu
DOSinAdhoc
- 一份介绍移动ad hoc网络中DOS攻击及其防御机制的学习资料-Introduced a mobile ad hoc network DOS attacks and defense mechanisms of learning materials
Build_a_wireless_intrusion_honeypot
- 众所周知无线网络在带来灵活接入的同时安全问题一直以来都是其软肋,企业无线网络或者家庭无线网络都很容易吸引外来“观光者”,一方面WEP,WPA等加密措施的纷纷被破解使得无线加密形同虚设,另一方面无线网络的自动寻网自动连接也让很多“非有意者”连接到你的无线网络中。那么我们该如何防范针对无线网络的攻击和入侵呢?我们是否能够通过必要的措施对入侵者进行反击呢?今天就请各位读者跟随笔者一起反客为主搭建无线入侵蜜罐,让入侵者露出本来面目。-As we all know to bring a flexible
SQL-Injection-Attacks-and-Defense
- SQL注入攻击与防御(英文版),唯一一本关于SQL注入攻击与防御的专业书籍。理解,发现、利用和防御SQL注入的最佳指导。见解精辟,丰富、精彩的SQL注入示例及防御策略。作者多年长期实践经验的总结。-SQL Injection Attacks and Defense (English), only one of the books on SQL injection attacks and defense. Understanding, found that the best defense aga
11
- ARP攻击程序 有效攻击局域网 使对方网络瘫痪-The ARP attack program effective attacks LAN so that the other network paralysis
instructer-of-hacker
- 亲爱的站长同志,你好,非常想加入,此内容是关于黑客攻击命令的文件。非常好 。-Dear webmaster comrades, hello, very much like to join this file on the command of the hacker attacks. Is very good.
memout
- 这是一个很好的溢出攻击VC++例子,不错的学习资料-A memory overflow attacks examples of good learning materials
blackholeaodv.cc.tar
- FILE SHOWS THE MODIFICATIONS FOR AODV.CC FOR INTRODUCING BLACKHOLE ATTACKS
WSN-localization-simulator
- Wireless Sensor Network to deploy base station and to control the mobility speed various algorithm and attacks are used
