A common mistake that people make when trying to design something completely foolproof is to underestimate the ingenuity of complete fools. | |
Douglas Adams, Mostly Harmless |
http://citeseer.nj.nec.com/context/29483/0 - ICMP packets returned during router queue overload.... command 4.
http://www.phrack.com/show.php?p=58&=5 - Armouring the ELF: Binary encryption on the UNIX platform
http://www.acm.uiuc.edu/sigmil/RevEng/t1.htm - Introduction to Reverse Engineering Software in Linux
www.zeltser.com/sans/gcih-practical/revmalw.html - Reverse Engineering Malware by lenny zeltser
http://staff.washington.edu/dittrich/misc/mstream.analysis.txt -mstream analysis for comparisons
http://www.sans.org/dosstep/ - Steps to prevent DoS
http://www.ddosworld.com/ - ddos world (information etc)
http://razor.bindview.com/tools/fenris/ - *cough* fenris *cough*
http://www.backerstreet.com/rec/rec.htm - REC (Reverse Engineering Compiler)
http://www.kde.org/bulletin/kdelibs-kdebug-13Sep1997.html - kDebug
http://biew.sourceforge.net/ - Biew (Binary VIEW)
Plus the stanndard linux tools: strace, strings, objdump