Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack
Search - attack - List
对Cube攻击的一些评价,正面和反面的都有-Hundreds of cryptographers were sitting in a dark lecture room at the University of California at Santa Barbara in the morning of Tuesday 19 August 2008 listening eagerly to Adi Shamir s hour-long talk "How to solve it: new techniques in algebraic cryptanalysis."
Update : 2024-05-05 Size : 449536 Publisher : Yongjuan Wang

对Trivium算法和其简化版本的Cube攻击-Cube attack on Trivuim algrithm
Update : 2024-05-05 Size : 316416 Publisher : Yongjuan Wang

DL : 0
this is a mimt attack implemetation with dsniff tools
Update : 2024-05-05 Size : 2048 Publisher : sandrosm06

网络攻防 跨站脚本攻击实例解析 网络安全-scriping attack
Update : 2024-05-05 Size : 1881088 Publisher : everli

网络嗅探器无论是在网络安全还是在黑客攻击方面均扮演了很重要的角色。通过使用网络嗅探器可以把网卡设置于混杂模式,并可实现对网络上传输的数据包的捕获与分析。此分析结果可供网络安全分析之用,但如为黑客所利用也可以为其发动进一步的攻击提供有价值的信息。可见,嗅探器实际是一把双刃剑。虽然网络嗅探器技术被黑客利用后会对网络安全构成一定的威胁,但嗅探器本身的危害并不是很大,主要是用来为其他黑客软件提供网络情报,真正的攻击主要是由其他黑软来完成的。而在网络安全方面,网络嗅探手段可以有效地探测在网络上传输的数据包信息,通过对这些信息的分析利用是有助于网络安全维护的。权衡利弊,有必要对网络嗅探器的实现原理进行介绍。-Network sniffer or network security both in terms of the hacker attacks both play a very important role. By using a network sniffer can network Card set in promiscuous mode, and enables transmission of data on the network packet capture and analysis. The results of this analysis for network security purposes, But the case can also be used by hackers to launch further attacks on its provision of valuable information. Can be seen, is actually a double-edged sword sniffer. Although However, network sniffer technology will be used by hackers network security after some kind of threat, but the sniffer itself is not very harmful, mainly Software used to provide network information of other hackers, the real attack is mainly done by other black soft s. In network security, network sniffing Probe means can effectively detect the network packet information transmitted by the analysis of the use of this information is helpful to maintain network security The. On balance, it is necessa
Update : 2024-05-05 Size : 4025344 Publisher : zhz

Fault attack on the DVB Common Scrambling Algorithm from Kai Wirth
Update : 2024-05-05 Size : 161792 Publisher : Chris

TCP端口扫描模块之C攻击,对于常见的c攻击进行了分析。-TCP port scan module of the C attack
Update : 2024-05-05 Size : 9216 Publisher :

DL : 0
基于密码加密的暴力破解法。猜测密码长度,3-6位,并逐一尝试破解,找出正确密码。-Brute-force Search Attack on the Password-based Encryption The program is divided into three parts: encryption, decryption and brute-force attack, which are the three methods in my class. In the brute-force attack method, use the given cipher text and the length of the password to try all possible passwords to encrypt the predefined plaintext and find the correct password.
Update : 2024-05-05 Size : 16384 Publisher : Will

小波和余弦变换的抗几何攻击数字水印算法,Wavelet and Cosine Transform Digital Watermarking Against Geometric Attack-Wavelet and Cosine Transform Digital Watermarking Against Geometric Attack
Update : 2024-05-05 Size : 475136 Publisher : lomgor

DL : 0
ARP攻击基于Winpcap,实验课题。实现中间人攻击和泛洪攻击,注释清晰,程序完整,可以直接运行实现。-ARP attack on Winpcap, experimental subjects. Achieve middle attacks and flooding attacks, comments clear, complete procedures, can be run directly achieved.
Update : 2024-05-05 Size : 13520896 Publisher : 明明

DL : 0
数字水印图像的攻击测试 包括滤波、剪切、添加噪声、jepg压缩攻击-Attack test digital watermarking images, including filtering, cropping, adding noise, jepg compression attack, etc.
Update : 2024-05-05 Size : 2048 Publisher : 马小平

黑客攻防必杀技!2004版,不算太过时。包含密码攻防,病毒攻防,木马攻防,浏览安全攻防,系统漏洞攻防,黑客软件攻防等等。好像没有这个资料上传,因而吐血贡献。-Hackers attack and defense! 2004 version, not too old. It contains the password attack and defense, viruses attack and defense, Trojans attack and defense, browsing security attack and defense, system bug and hole attack and defense, hacker software attack and defense, and so on.
Update : 2024-05-05 Size : 27981824 Publisher : WD

label based dv hop localization against warm hole attack in wireless sensor network
Update : 2024-05-05 Size : 205824 Publisher : vineet

俄罗斯著名黑客克里斯,卡巴斯基网络攻击技术基础,原版书籍-Chris the famous Russian hacker, Kaspersky network attack techniques based on the original books
Update : 2024-05-05 Size : 1925120 Publisher : Ben

Attack in Ad hoc Network
Update : 2024-05-05 Size : 393216 Publisher : matu76556

DL : 0
CC Attack Device [Beta version] CC Attack Device [Beta version]-CC Attack Device [Beta version]CC Attack Device [Beta version]
Update : 2024-05-05 Size : 26624 Publisher : ccx

DL : 0
虚拟机器人足球比赛的源程序代码,能攻善守-Virtual robot soccer game source code, can be good defensive attack
Update : 2024-05-05 Size : 23552 Publisher : vbteacher

黑客的基本攻击方法及原理,以及一些简单软件应用。 网络渗透攻击事件的发生极为普遍,众多的网络管理员和网络安全工作者却对网络安全环境所面临的严峻考验缺乏足够的认识,因而也未曾采取全面的防范补救措施应对各种攻击行为。《孙子兵法》曰“知已知彼,百战不殆;不知彼而知已,一胜一负;不知彼不知已,每战必败”。建立有效的防御体系的惟一障碍是知识的不足。不论你是一位信息安全技术的爱好者、一位IT专家或一名有经验的信息安全实践者,只要你想建立起一个有效的防御体系,就必须了解黑客们所使用的基本工具和手段。 以“网络渗透攻击”为切入点,就是要让实训对象认清网络安全环境和网络渗透入侵的一些普遍规律,并有针对性的补充知识和采取全面的防范补救措施,为网络防御提供事件依据和需求来源。力争打破常规实训体系,不同于普通实训书籍或培训机构的教学模式,实现由浅入深、由意识到技术分而治之的教学模式。-The fundamental hacker attack methods and principles, as well as some simple software application. Network attack events is very common, many network administrators and network security workers to network security environment is facing a severe test to lack enough understanding, and therefore not taking comprehensive precautionary and remedial measures to deal with all kinds of aggressive behavior. " Grandchildren strategics" Yue" Zhiyizhibi, invincible do not know and confidant, one of a negative do not know do not know, every war must be". The establishment of an effective defense system only obstacle is lack of knowledge. Whether you re a information security technology enthusiasts, a IT expert or an experienced information security practitioners, as long as you want to set up an effective defense system, it is necessary to understand the hackers were using basic tools and methods. With "the network attack" as the breakthrough point, is to make the training object recognize
Update : 2024-05-05 Size : 1503232 Publisher : 小邓

Defense From syn & ping Flood attack
Update : 2024-05-05 Size : 1024 Publisher : d3vil

DL : 0
RSA加密算法的基于概率算法的攻击,由N求出PQ。-RSA encryption algorithm based on probabilistic algorithms attack, obtained by N the PQ.
Update : 2024-05-05 Size : 2852864 Publisher : zxl
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 50 »
DSSZ is the largest source code store in internet!
Contact us :
1999-2046 DSSZ All Rights Reserved.