124:
In 2013, Packet Storm launched a bug bounty program to buy working exploits that would be given back to the community for their own testing purposes. Later that year, they worked with a security researcher to help expose a large scale
495:
129:
issue with the popular
Internet site Facebook. After Facebook claimed that only 6 million people were affected, additional testing by Packet Storm exposed that the numbers were not accurately reported.
112:
The site was originally created by Ken
Williams who sold it in 1999 to Kroll O'Gara and just over a year later, it was given back to the security community. While at Kroll O'Gara, Packet Storm awarded
521:
104:, and security advisories. It is operated by a group of security enthusiasts that publish new security information and offer tools for educational and testing purposes.
666:
499:
384:
656:
661:
474:
405:
147:
189:
589:
168:
301:
429:
232:
101:
546:
496:"Facebook Login, Home, Friends, Search: Company Accused of Leaving Out Important Details in Information Leak Scandal"
343:
118:
568:
121:. Today, they offer a suite of consulting services and the site is referenced in hundreds of books.
90:
363:
259:
237:
97:
30:
126:
650:
569:"Experts Says Facebook Leak Of 6 Million Users' Data Might Be Bigger Than We Thought"
453:
613:
280:
454:"Facebook's Creepy Data-Grabbing Ways Make It The Borg Of The Digital World"
210:
322:
406:"Firm: Facebook's shadow profiles are 'frightening' dossiers on everyone"
93:
114:
639:
590:"Firm: Facebook 'bug' worse than reported; non-users also affected"
364:"Did ZDI snub your 0-day attack? Packet Storm will buy it for $ 7k"
49:
593:
433:
409:
385:"Packetstorm opens bug bounty programme with $ 7,000 top reward"
117:$ 10,000 in a whitepaper contest dedicated to the mitigation of
475:"Facebook 'dossier' find raises contact list privacy questions"
430:"Anger mounts after Facebook's 'shadow profiles' leak in bug"
614:"Facebook Bug Leaked More Info Than Company Reported?"
66:
58:
44:
36:
24:
190:"Mozilla Claims Firefox 1.5 Hole Poses Minor Risk"
169:"Compiling Exploit Code: A Network-Security Must"
281:"Hacker Discloses New Internet Attack Software"
233:"Security Firm To Revive Computer-Defense Site"
8:
148:"Linux Systems Being Hit By SSH-Key Attacks"
19:
302:"Security Websites Hit By Big DDoS Attack"
18:
667:Internet properties established in 1998
139:
344:"Packet Storm Search In Google Books"
119:distributed denial of service attacks
7:
498:. designntrend.com. Archived from
323:"Packet Storm Security Consulting"
14:
547:"Facebook: Math Of The Aftermath"
616:. net-security.org. 27 June 2013
192:. infoworld.com. 8 December 2005
96:offering current and historical
657:Computer security organizations
456:. techcrunch.com. 24 June 2013
171:. infoworld.com. 24 March 2006
1:
520:Oremus, Will (26 June 2013).
477:. csoonline.com. 25 June 2013
567:Guarini, Drew (2013-06-27).
231:Wayner, Peter (1999-08-17).
16:Information security website
72:; 26 years ago
683:
662:Computer network security
549:. packetstormsecurity.com
522:"With Friends Like These"
325:. packetstormsecurity.com
260:"Packetstorm Rides Again"
213:. packetstormsecurity.com
304:. informationweek.com
150:. informationweek.com
87:Packet Storm Security
40:The Packet Storm Team
571:. huffingtonpost.com
211:"About Packet Storm"
91:information security
366:. theregister.co.uk
262:. theregister.co.uk
50:packetstormsecurity
21:
238:The New York Times
98:computer security
84:
83:
31:Computer security
674:
643:
642:
640:Official website
625:
624:
622:
621:
610:
604:
603:
601:
600:
586:
580:
579:
577:
576:
564:
558:
557:
555:
554:
543:
537:
536:
534:
533:
517:
511:
510:
508:
507:
492:
486:
485:
483:
482:
471:
465:
464:
462:
461:
450:
444:
443:
441:
440:
426:
420:
419:
417:
416:
402:
396:
395:
393:
392:
381:
375:
374:
372:
371:
360:
354:
353:
351:
350:
340:
334:
333:
331:
330:
319:
313:
312:
310:
309:
298:
292:
291:
289:
288:
277:
271:
270:
268:
267:
256:
250:
249:
247:
245:
228:
222:
221:
219:
218:
207:
201:
200:
198:
197:
186:
180:
179:
177:
176:
165:
159:
158:
156:
155:
144:
80:
78:
73:
54:
51:
22:
682:
681:
677:
676:
675:
673:
672:
671:
647:
646:
638:
637:
634:
629:
628:
619:
617:
612:
611:
607:
598:
596:
588:
587:
583:
574:
572:
566:
565:
561:
552:
550:
545:
544:
540:
531:
529:
519:
518:
514:
505:
503:
494:
493:
489:
480:
478:
473:
472:
468:
459:
457:
452:
451:
447:
438:
436:
428:
427:
423:
414:
412:
404:
403:
399:
390:
388:
383:
382:
378:
369:
367:
362:
361:
357:
348:
346:
342:
341:
337:
328:
326:
321:
320:
316:
307:
305:
300:
299:
295:
286:
284:
279:
278:
274:
265:
263:
258:
257:
253:
243:
241:
230:
229:
225:
216:
214:
209:
208:
204:
195:
193:
188:
187:
183:
174:
172:
167:
166:
162:
153:
151:
146:
145:
141:
136:
110:
76:
74:
71:
48:
37:Created by
27:
17:
12:
11:
5:
680:
678:
670:
669:
664:
659:
649:
648:
645:
644:
633:
632:External links
630:
627:
626:
605:
581:
559:
538:
512:
487:
466:
445:
421:
397:
376:
355:
335:
314:
293:
272:
251:
223:
202:
181:
160:
138:
137:
135:
132:
127:shadow profile
109:
106:
82:
81:
68:
64:
63:
60:
56:
55:
46:
42:
41:
38:
34:
33:
28:
25:
15:
13:
10:
9:
6:
4:
3:
2:
679:
668:
665:
663:
660:
658:
655:
654:
652:
641:
636:
635:
631:
615:
609:
606:
595:
591:
585:
582:
570:
563:
560:
548:
542:
539:
527:
523:
516:
513:
502:on 2013-07-04
501:
497:
491:
488:
476:
470:
467:
455:
449:
446:
435:
431:
425:
422:
411:
407:
401:
398:
386:
380:
377:
365:
359:
356:
345:
339:
336:
324:
318:
315:
303:
297:
294:
282:
276:
273:
261:
255:
252:
240:
239:
234:
227:
224:
212:
206:
203:
191:
185:
182:
170:
164:
161:
149:
143:
140:
133:
131:
128:
122:
120:
116:
107:
105:
103:
99:
95:
92:
88:
69:
65:
61:
57:
53:
47:
43:
39:
35:
32:
29:
23:
618:. Retrieved
608:
597:. Retrieved
584:
573:. Retrieved
562:
551:. Retrieved
541:
530:. Retrieved
525:
515:
504:. Retrieved
500:the original
490:
479:. Retrieved
469:
458:. Retrieved
448:
437:. Retrieved
424:
413:. Retrieved
400:
389:. Retrieved
379:
368:. Retrieved
358:
347:. Retrieved
338:
327:. Retrieved
317:
306:. Retrieved
296:
285:. Retrieved
275:
264:. Retrieved
254:
244:November 14,
242:. Retrieved
236:
226:
215:. Retrieved
205:
194:. Retrieved
184:
173:. Retrieved
163:
152:. Retrieved
142:
123:
111:
86:
85:
26:Type of site
20:Packet Storm
528:. slate.com
651:Categories
620:2013-07-17
599:2013-07-17
575:2013-07-17
553:2013-07-17
532:2013-07-17
506:2013-07-17
481:2013-07-17
460:2013-07-17
439:2013-07-17
415:2013-07-17
391:2013-01-16
387:. v3.co.uk
370:2013-01-18
349:2013-07-17
329:2013-07-17
308:2009-02-10
287:2017-11-14
283:. cnet.com
266:2001-07-16
217:2009-12-06
196:2005-12-08
175:2006-03-24
154:2008-08-27
134:References
59:Commercial
108:Overview
102:exploits
67:Launched
100:tools,
94:website
75: (
115:Mixter
89:is an
594:ZDNet
526:Slate
434:ZDNet
410:ZDNet
246:2017
77:1998
70:1998
52:.com
62:Yes
45:URL
653::
592:.
524:.
432:.
408:.
235:.
623:.
602:.
578:.
556:.
535:.
509:.
484:.
463:.
442:.
418:.
394:.
373:.
352:.
332:.
311:.
290:.
269:.
248:.
220:.
199:.
178:.
157:.
79:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.