THE

SPRAWL

  •  
  •  
  •  
  • sprawllatest

    syn flooder

    Download synflood.pl
    Size 476 bytes
    DateJuly 4th, 2008
    Version0.1

    A proof of concept script to perform a SYN flood attack on a target host. Requires Net::RawIP module. Read more.

    oracle default ports

    Oracle Database is a complex system requiring a large number of services running on a single system. This article attempts to enumerate common Oracle services and associated network ports found on live systems. Read more.

    oracle tns protocol

    Oracle's proprietary TNS (Transparent Network Substrate) protocol is used to interact with Oracle's RDBMS. In this article you will learn about different TNS packet types and their structure. Read more.

    oracle database commands

    Useful Oracle PL/SQL commands: Read more.

    oracle rdbms

    Oracle Database or RDBMS (Object-Relational Database Management System) is a complex system for storage and retrieval of relational data. In this article you will learn the basic architecture of the Oracle Databases as well as common attacks against it. Read more.

    oracle tns listener

    Oracle Listener serves as a main communication point for the database. It provides necessary abstraction to host's transport protocols in order to allow Oracle's higher level session protocols to function across multiple platforms. This article covers different commands used to interact with the TNS Listener as well as common attacks against it. Read more.

    hackers in wonderland

    A great documentary on UK and US Hackers. The film interviews a number of prominent UK hackers including ColdFire, Phobos, cyberjunkie. Next it goes across the Atlantic ocean to cover Defcon and returns back to UK to interview hacker group called MOLOCH. Read more.

    cyberwars

    Documentary on the Hacker underground in Asia offers revealing interviews with many prominent hackers from China, Philippines, and South Korea. The documentary begins by interviewing hackers turned security professionals similar to their western counterparts. Next it proceeds to cover more unique attributes of the region. A large segment of this film is dedicated to hacktivist/communist groups in China launching attacks against US targets. At last the documentary concludes with a cautionary tale of hackers working for terrorist groups. Read more.



    π
    ///\oo/\\\