Knowledge (XXG)

Packet Storm

Source 📝

124:
In 2013, Packet Storm launched a bug bounty program to buy working exploits that would be given back to the community for their own testing purposes. Later that year, they worked with a security researcher to help expose a large scale
495: 129:
issue with the popular Internet site Facebook. After Facebook claimed that only 6 million people were affected, additional testing by Packet Storm exposed that the numbers were not accurately reported.
112:
The site was originally created by Ken Williams who sold it in 1999 to Kroll O'Gara and just over a year later, it was given back to the security community. While at Kroll O'Gara, Packet Storm awarded
521: 104:, and security advisories. It is operated by a group of security enthusiasts that publish new security information and offer tools for educational and testing purposes. 666: 499: 384: 656: 661: 474: 405: 147: 189: 589: 168: 301: 429: 232: 101: 546: 496:"Facebook Login, Home, Friends, Search: Company Accused of Leaving Out Important Details in Information Leak Scandal" 343: 118: 568: 121:. Today, they offer a suite of consulting services and the site is referenced in hundreds of books. 90: 363: 259: 237: 97: 30: 126: 650: 569:"Experts Says Facebook Leak Of 6 Million Users' Data Might Be Bigger Than We Thought" 453: 613: 280: 454:"Facebook's Creepy Data-Grabbing Ways Make It The Borg Of The Digital World" 210: 322: 406:"Firm: Facebook's shadow profiles are 'frightening' dossiers on everyone" 93: 114: 639: 590:"Firm: Facebook 'bug' worse than reported; non-users also affected" 364:"Did ZDI snub your 0-day attack? Packet Storm will buy it for $ 7k" 49: 593: 433: 409: 385:"Packetstorm opens bug bounty programme with $ 7,000 top reward" 117:$ 10,000 in a whitepaper contest dedicated to the mitigation of 475:"Facebook 'dossier' find raises contact list privacy questions" 430:"Anger mounts after Facebook's 'shadow profiles' leak in bug" 614:"Facebook Bug Leaked More Info Than Company Reported?" 66: 58: 44: 36: 24: 190:"Mozilla Claims Firefox 1.5 Hole Poses Minor Risk" 169:"Compiling Exploit Code: A Network-Security Must" 281:"Hacker Discloses New Internet Attack Software" 233:"Security Firm To Revive Computer-Defense Site" 8: 148:"Linux Systems Being Hit By SSH-Key Attacks" 19: 302:"Security Websites Hit By Big DDoS Attack" 18: 667:Internet properties established in 1998 139: 344:"Packet Storm Search In Google Books" 119:distributed denial of service attacks 7: 498:. designntrend.com. Archived from 323:"Packet Storm Security Consulting" 14: 547:"Facebook: Math Of The Aftermath" 616:. net-security.org. 27 June 2013 192:. infoworld.com. 8 December 2005 96:offering current and historical 657:Computer security organizations 456:. techcrunch.com. 24 June 2013 171:. infoworld.com. 24 March 2006 1: 520:Oremus, Will (26 June 2013). 477:. csoonline.com. 25 June 2013 567:Guarini, Drew (2013-06-27). 231:Wayner, Peter (1999-08-17). 16:Information security website 72:; 26 years ago 683: 662:Computer network security 549:. packetstormsecurity.com 522:"With Friends Like These" 325:. packetstormsecurity.com 260:"Packetstorm Rides Again" 213:. packetstormsecurity.com 304:. informationweek.com 150:. informationweek.com 87:Packet Storm Security 40:The Packet Storm Team 571:. huffingtonpost.com 211:"About Packet Storm" 91:information security 366:. theregister.co.uk 262:. theregister.co.uk 50:packetstormsecurity 21: 238:The New York Times 98:computer security 84: 83: 31:Computer security 674: 643: 642: 640:Official website 625: 624: 622: 621: 610: 604: 603: 601: 600: 586: 580: 579: 577: 576: 564: 558: 557: 555: 554: 543: 537: 536: 534: 533: 517: 511: 510: 508: 507: 492: 486: 485: 483: 482: 471: 465: 464: 462: 461: 450: 444: 443: 441: 440: 426: 420: 419: 417: 416: 402: 396: 395: 393: 392: 381: 375: 374: 372: 371: 360: 354: 353: 351: 350: 340: 334: 333: 331: 330: 319: 313: 312: 310: 309: 298: 292: 291: 289: 288: 277: 271: 270: 268: 267: 256: 250: 249: 247: 245: 228: 222: 221: 219: 218: 207: 201: 200: 198: 197: 186: 180: 179: 177: 176: 165: 159: 158: 156: 155: 144: 80: 78: 73: 54: 51: 22: 682: 681: 677: 676: 675: 673: 672: 671: 647: 646: 638: 637: 634: 629: 628: 619: 617: 612: 611: 607: 598: 596: 588: 587: 583: 574: 572: 566: 565: 561: 552: 550: 545: 544: 540: 531: 529: 519: 518: 514: 505: 503: 494: 493: 489: 480: 478: 473: 472: 468: 459: 457: 452: 451: 447: 438: 436: 428: 427: 423: 414: 412: 404: 403: 399: 390: 388: 383: 382: 378: 369: 367: 362: 361: 357: 348: 346: 342: 341: 337: 328: 326: 321: 320: 316: 307: 305: 300: 299: 295: 286: 284: 279: 278: 274: 265: 263: 258: 257: 253: 243: 241: 230: 229: 225: 216: 214: 209: 208: 204: 195: 193: 188: 187: 183: 174: 172: 167: 166: 162: 153: 151: 146: 145: 141: 136: 110: 76: 74: 71: 48: 37:Created by 27: 17: 12: 11: 5: 680: 678: 670: 669: 664: 659: 649: 648: 645: 644: 633: 632:External links 630: 627: 626: 605: 581: 559: 538: 512: 487: 466: 445: 421: 397: 376: 355: 335: 314: 293: 272: 251: 223: 202: 181: 160: 138: 137: 135: 132: 127:shadow profile 109: 106: 82: 81: 68: 64: 63: 60: 56: 55: 46: 42: 41: 38: 34: 33: 28: 25: 15: 13: 10: 9: 6: 4: 3: 2: 679: 668: 665: 663: 660: 658: 655: 654: 652: 641: 636: 635: 631: 615: 609: 606: 595: 591: 585: 582: 570: 563: 560: 548: 542: 539: 527: 523: 516: 513: 502:on 2013-07-04 501: 497: 491: 488: 476: 470: 467: 455: 449: 446: 435: 431: 425: 422: 411: 407: 401: 398: 386: 380: 377: 365: 359: 356: 345: 339: 336: 324: 318: 315: 303: 297: 294: 282: 276: 273: 261: 255: 252: 240: 239: 234: 227: 224: 212: 206: 203: 191: 185: 182: 170: 164: 161: 149: 143: 140: 133: 131: 128: 122: 120: 116: 107: 105: 103: 99: 95: 92: 88: 69: 65: 61: 57: 53: 47: 43: 39: 35: 32: 29: 23: 618:. Retrieved 608: 597:. Retrieved 584: 573:. Retrieved 562: 551:. Retrieved 541: 530:. Retrieved 525: 515: 504:. Retrieved 500:the original 490: 479:. Retrieved 469: 458:. Retrieved 448: 437:. Retrieved 424: 413:. Retrieved 400: 389:. Retrieved 379: 368:. Retrieved 358: 347:. Retrieved 338: 327:. Retrieved 317: 306:. Retrieved 296: 285:. Retrieved 275: 264:. Retrieved 254: 244:November 14, 242:. Retrieved 236: 226: 215:. Retrieved 205: 194:. Retrieved 184: 173:. Retrieved 163: 152:. Retrieved 142: 123: 111: 86: 85: 26:Type of site 20:Packet Storm 528:. slate.com 651:Categories 620:2013-07-17 599:2013-07-17 575:2013-07-17 553:2013-07-17 532:2013-07-17 506:2013-07-17 481:2013-07-17 460:2013-07-17 439:2013-07-17 415:2013-07-17 391:2013-01-16 387:. v3.co.uk 370:2013-01-18 349:2013-07-17 329:2013-07-17 308:2009-02-10 287:2017-11-14 283:. cnet.com 266:2001-07-16 217:2009-12-06 196:2005-12-08 175:2006-03-24 154:2008-08-27 134:References 59:Commercial 108:Overview 102:exploits 67:Launched 100:tools, 94:website 75: ( 115:Mixter 89:is an 594:ZDNet 526:Slate 434:ZDNet 410:ZDNet 246:2017 77:1998 70:1998 52:.com 62:Yes 45:URL 653:: 592:. 524:. 432:. 408:. 235:. 623:. 602:. 578:. 556:. 535:. 509:. 484:. 463:. 442:. 418:. 394:. 373:. 352:. 332:. 311:. 290:. 269:. 248:. 220:. 199:. 178:. 157:. 79:)

Index

Computer security
packetstormsecurity.com
information security
website
computer security
exploits
Mixter
distributed denial of service attacks
shadow profile
"Linux Systems Being Hit By SSH-Key Attacks"
"Compiling Exploit Code: A Network-Security Must"
"Mozilla Claims Firefox 1.5 Hole Poses Minor Risk"
"About Packet Storm"
"Security Firm To Revive Computer-Defense Site"
The New York Times
"Packetstorm Rides Again"
"Hacker Discloses New Internet Attack Software"
"Security Websites Hit By Big DDoS Attack"
"Packet Storm Security Consulting"
"Packet Storm Search In Google Books"
"Did ZDI snub your 0-day attack? Packet Storm will buy it for $ 7k"
"Packetstorm opens bug bounty programme with $ 7,000 top reward"
"Firm: Facebook's shadow profiles are 'frightening' dossiers on everyone"
ZDNet
"Anger mounts after Facebook's 'shadow profiles' leak in bug"
ZDNet
"Facebook's Creepy Data-Grabbing Ways Make It The Borg Of The Digital World"
"Facebook 'dossier' find raises contact list privacy questions"
"Facebook Login, Home, Friends, Search: Company Accused of Leaving Out Important Details in Information Leak Scandal"
the original

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.