Packet Storm

Packet Storm
Type of site
Computer Security
Created by The Packet Storm Team
Website packetstormsecurity.com
Alexa rank 37,406 (April 2014)[1]
Commercial Yes
Launched 1998

Packet Storm Security is a popular information security website offering current and historical computer security tools,[2] exploits,[3] and security advisories. It is operated by a group of security enthusiasts that publish new security information[4] and offer tools for educational and testing purposes.[5]

Overview

The site was originally created by Ken Williams who sold it in 1999 to Kroll O'Gara[6] and just over a year later, it was given back to the security community.[7] While at Kroll O'Gara, Packet Storm awarded Mixter[8] $10,000 in a whitepaper contest dedicated to the mitigation of distributed denial of service attacks.[9] Today, they offer a suite of consulting services[10] and the site is referenced in hundreds of books.[11]

In 2013, Packet Storm launched a bug bounty program to buy working exploits that would be given back to the community for their own testing purposes.[12][13] Later that year, they worked with a security researcher to help expose a large scale shadow profile issue with the popular Internet site Facebook.[14][15][16][17][18][19][20][21] After Facebook claimed that only 6 million people were affected, additional testing by Packet Storm exposed that the numbers were not accurately reported.[22][23][24][25]

References

  1. "Packetstormsecurity.org Site Info". Alexa Internet. Retrieved 2014-04-01.
  2. "Linux Systems Being Hit By SSH-Key Attacks". informationweek.com. Retrieved 2008-08-27.
  3. "Compiling Exploit Code: A Network-Security Must". infoworld.com. Retrieved 2006-03-24.
  4. "Mozilla Claims Firefox 1.5 Hole Poses Minor Risk". infoworld.com. Retrieved 2005-12-08.
  5. "About Packet Storm". packetstormsecurity.com. Retrieved 2009-12-06.
  6. Wayner, Peter (1999-08-17). "Security Firm To Revive Computer-Defense Site". nytimes.com. Retrieved 1999-08-17. Check date values in: |access-date= (help)
  7. "Packetstorm Rides Again". theregister.co.uk. Retrieved 2001-07-16.
  8. "Hacker Discloses New Internet Attack Software". cnet.com. Retrieved 2000-02-14. Check date values in: |access-date= (help)
  9. "Security Websites Hit By Big DDoS Attack". informationweek.com. Retrieved 2009-02-10.
  10. "Packet Storm Security Consulting". packetstormsecurity.com. Retrieved 2013-07-17.
  11. "Packet Storm Search In Google Books". google.com. Retrieved 2013-07-17.
  12. "Did ZDI snub your 0-day attack? Packet Storm will buy it for $7k". theregister.co.uk. Retrieved 2013-01-18.
  13. "Packetstorm opens bug bounty programme with $7,000 top reward". v3.co.uk. Retrieved 2013-01-16.
  14. "Facebook: Where Your Friends Are Your Worst Enemies". packetstormsecurity.com. Retrieved 2013-07-17.
  15. "Firm: Facebook's shadow profiles are 'frightening' dossiers on everyone". zdnet.com. Retrieved 2013-07-17.
  16. "Anger mounts after Facebook's 'shadow profiles' leak in bug". zdnet.com. Retrieved 2013-07-17.
  17. "Facebook's Creepy Data-Grabbing Ways Make It The Borg Of The Digital World". techcrunch.com. Retrieved 2013-07-17.
  18. "Important Message from Facebook's White Hat Program". facebook.com. Retrieved 2013-07-17.
  19. "Facebook 'dossier' find raises contact list privacy questions". csoonline.com. Retrieved 2013-07-17.
  20. "Facebook Login, Home, Friends, Search: Company Accused of Leaving Out Important Details in Information Leak Scandal". designntrend.com. Retrieved 2013-07-17.
  21. "With Friends Like These". slate.com. Retrieved 2013-07-17.
  22. "Facebook: Math Of The Aftermath". packetstormsecurity.com. Retrieved 2013-07-17.
  23. Guarini, Drew (2013-06-27). "Experts Says Facebook Leak Of 6 Million Users' Data Might Be Bigger Than We Thought". huffingtonpost.com. Retrieved 2013-07-17.
  24. "Firm: Facebook 'bug' worse than reported; non-users also affected". zdnet.com. Retrieved 2013-07-17.
  25. "Facebook Bug Leaked More Info Than Company Reported?". net-security.org. Retrieved 2013-07-17.
This article is issued from Wikipedia - version of the 9/12/2015. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.