exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Potential Dangers Of Active-X Attacks
Posted Jul 5, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Whitepaper called Become Fully Aware of the Potential Dangers of Active-X Attacks. Exploiting Active-X components vulnerabilities in Windows has become a favored method of attackers aiming to compromise specific computers. Such targeted attacks have increasingly become a threat to companies and government agencies. This talk will explain this kind of attack and show how this flaw could be discovered while going through exploitation.

tags | paper, vulnerability, activex
systems | windows
SHA-256 | 9eeb90330cfbccc1cd8f8478aef2e4c16a609d57f5f1172310f841fe03112f37

Related Files

Bypassing Spam Filters Using Homographs
Posted Jul 30, 2012
Authored by Fady Mohamed Osman

This is a whitepaper called Bypassing Spam Filter Using Homographs. Some generation code is also included.

tags | paper
systems | linux
SHA-256 | 53ce87d77ad354d381340e51d46995bbf63257ebb4dd4ce48fd728ce00168df1
Reverse Engineering Malware Part 1
Posted May 2, 2012
Authored by Arunpreet Singh

Whitepaper called Reverse Engineering Malware Part 1.

tags | paper
SHA-256 | 36dd2e02c332eee7ad1b0a13487a9cc66d5bcca061c99f0a07d0ec1b39863a5f
Actuality Of SMBRelay In Modern Windows Networks
Posted Apr 28, 2012
Authored by Ares

Whitepaper called Actuality of SMBRelay in Modern Windows Networks.

tags | paper
systems | windows
SHA-256 | f87fc888c4e56b21d8c099e4f1faceacf01f9e809547979686a603d553e4449e
Intro To SQL Injection And Countermeasures
Posted Apr 24, 2012
Authored by Hitesh Malviya

Whitepaper called Intro to SQL Injection and Countermeasures.

tags | paper, sql injection
SHA-256 | 23c1a4f9df055f7ced98f3bad083e6f1881e9336751efcd55ecb930ac7852e99
Exploring Windows Backdoors
Posted Apr 20, 2012
Authored by Lulzsec47

This is a whitepaper called Exploring Windows Backdoors - Bypassing Firewalls on Webhosting Providers.

tags | paper
systems | windows
SHA-256 | 38f11023e9d479f3a8474437778cd503766c4e12137a5484b98856546e803504
The Source Is A Lie
Posted Apr 17, 2012
Authored by Andreas Nusser | Site sec-consult.com

Whitepaper called The Source Is A Lie. Backdoors have always been a concern of the security community. In recent years the idea of not trusting the developer has gained momentum and manifested itself in various forms of source code review. For Java, being one of the most popular programming languages, numerous tools and papers have been written to help during reviews. While these tools and techniques are getting developed further, they usually focus on traditional programming paradigms. Modern concepts like Aspect Oriented Programming or the Java Reflection API are left out. Especially the use of Java’s Reflection API in conjunction with the lesser known “string pool” can lead to a new kind of backdoor. This backdoor hides itself from unwary reviewer by disguising its access to critical resources like credential through indirection. To raise the awareness about this particular kind of backdoor, this paper will provide a short introduction to the string pool, show how reflection can be used to manipulate it, demonstrate how a backdoor can abuse this, and discuss how it can be uncovered.

tags | paper, java
SHA-256 | 2a07f7ba8590b6f096b40e0241279121aa6cb6cc3400db03bb9062a53afd7af0
JavaScript Deobfuscation
Posted Apr 16, 2012
Authored by Sudeep Singh

Whitepaper called JavaScript Deobfuscation - A Manual Approach.

tags | paper, javascript
SHA-256 | f62eacd0b6de91f97b5724b5c6970f9e9ca83dcf56688802e7c335036028d5a8
Blind Date With Your Girlfriend
Posted Apr 10, 2012
Authored by Nipun Jaswal

This is a whitepaper called Blind Date With Your Girlfriend. It is a brief tutorial that explains how to use Metasploit to hack a Windows box.

tags | paper
systems | windows
SHA-256 | 157492120226df24ef2e8aea4490de261f57ae418be5905de19a8dfc3264fd9e
Anatomy Of A Credit Card
Posted Apr 4, 2012
Authored by Hitesh Malviya

Whitepaper called Anatomy of a Credit Card.

tags | paper
SHA-256 | 4183b3b6ecb49370ab7d97d6e702fd712537ba32242f6fe8c7435726e88e78bf
DNS Spoofing
Posted Apr 4, 2012
Authored by Marcelo Moraes

Whitepaper called DNS Spoofing. Written in Portuguese.

tags | paper, spoof
SHA-256 | 1a706d22a376215952da0e4ba8f07c9da32585075efe562a34786039c130ca44
Basic Pentesting Steps
Posted Mar 29, 2012
Authored by n4sss

Whitepaper called Basic Pentesting Steps. Written in Portuguese.

tags | paper
SHA-256 | cf62acb113548b7962de04575bfaad6edc9c7585dea71db2927ffc03e60a2f51
Exploring And Patching Remote File Disclosure
Posted Mar 22, 2012
Authored by NassRawI

Whitepaper called Exploring and Patching Remote File Disclosure Vulnerabilities. Written in Arabic.

tags | paper, remote, vulnerability
SHA-256 | b3464630fe63b4411821de351e79f101e7ed02d8035f0a8b51796e260fc6fb70
Using UPX As A Security Packer
Posted Mar 22, 2012
Authored by Dr Petri

Whitepaper called Using UPX as a Security Packer. It goes into detail on how to use this tool and how to bring obfuscation into it.

tags | paper
SHA-256 | fb92011966919c8736a7d2cdb3031ca76789896634cbf940310ad240e43e48b2
Pentest: Information Gathering
Posted Mar 19, 2012
Authored by Jose Miguel Holguin, Broja Merino Febrero

This is a whitepaper called Pentest: Information Gathering. Written in Spanish.

tags | paper
SHA-256 | 0a120fb44dd61a5a363336664fa11eb9a02a30c416dd768a578b7a9619ceca1f
Attacking The Washington, D.C. Internet Voting System
Posted Mar 3, 2012
Authored by Scott Wolchok, Eric Wustrow, J. Alex Halderman, Dawn Isabel

Whitepaper called Attacking the Washington, D.C. Internet Voting System. In 2010, Washington, D.C. developed an Internet voting pilot project that was intended to allow overseas absentee voters to cast their ballots using a website. The authors of this paper participated in a challenge to break the security of the system and in doing so, elected Bender from Futurama to the school board.

tags | paper
SHA-256 | 705cb8163275671c27c510a5c5b8844bcd41d0a76937766a605fd5ca273a0a7a
Metasploit Low Level View
Posted Feb 28, 2012
Authored by Saad Talaat

Whitepaper called Metasploit: Low Level View. It touches on topics such as code injection and malware detection evasion / Metasploit encoders.

tags | paper
SHA-256 | 07e3eb3f9a8a6d81bd3f80976de99d9b360b6c9b90ddb4432b6343a6f12cc0c2
Return-Oriented Programming Na Unha!
Posted Feb 23, 2012
Authored by m0nad

Whitepaper called Return-Oriented Programming Na Unha! Written in Portuguese.

tags | paper
SHA-256 | e6b54ef5474c0dde40ebf73da35e14b105441360e400162136a7f59ae1fc1f07
Wi-Fi Security With Wi-Fi Protection Plus
Posted Feb 12, 2012
Authored by Ajin Abraham, Vimal Jyothi

Whitepaper called Wi-Fi Security with Wi-Fi Protection Plus. Wi-Fi P+ is a new security architecture proposed by the authors.

tags | paper
SHA-256 | a1796ef5991f37e305255cca3db5c7cb382fdf8cc9c174e0f73caebf4c6d9270
Shell Code Injection To Process
Posted Feb 9, 2012
Authored by Turkeshan

Whitepaper called Shell Code Injection To Process. Written in Turkish.

tags | paper, shell
SHA-256 | fba9caeb2eb8c95ed9608a1aff5cf93b1e8a07d62825f455dea832f94471570d
DNS Service Oriented DoS / DDoS Attacks
Posted Feb 5, 2012
Authored by Huzeyfe ONAL

Whitepaper called DNS Service Oriented Denial of Service / Distributed Denial of Service Attacks. Written in Turkish.

tags | paper, denial of service
SHA-256 | 493ad9e6e104e2d2161841c38de46e0ed488cc2b36141db458386aa4c11820ec
A Backdoor In The Next Generation Active Directory
Posted Jan 24, 2012
Authored by Dmitriy Evteev

This is a brief whitepaper called A Backdoor in the Next Generation Active Directory.

tags | paper
SHA-256 | dd040be0d2bdc00e6d0cbeedaaf496611de0e99e0335d67ebeebc9aaca01a674
SafeSEH+SEHOP All-At-Once Bypass Exploitation Method Principles
Posted Jan 11, 2012

Whitepaper called SafeSEH+SEHOP all-at-once bypass exploitation method principles.

tags | paper
SHA-256 | 209ec6ec9584ba32640f53ad2c68e710468e453169d11ebbd3a1605912e0684a
Buffer Overflows: Anatomy Of An Exploit
Posted Jan 11, 2012
Authored by Joshua Hulse

Whitepaper called Buffer Overflows: Anatomy of an Exploit. A look at how systems are exploited and why these exploits exist.

tags | paper, overflow
SHA-256 | d5a0653a937271a349afae80c0cfe39ae9f07b8b49348b5380f6d83a8f5fe510
Linux Kernel Hooking / Data Manipulations / Root Exploits
Posted Jan 3, 2012
Authored by Turkeshan

Whitepaper called Linux Kernel Hooking, Data Manipulations and Making Root Exploits. Written in Turkish.

tags | paper, kernel, root
systems | linux
SHA-256 | 1a5539ddd930fc4dd551c4e0af67794c3d2813565f6acd29073cd082e1056454
DoS Attacks And Mitigation Techniques
Posted Dec 28, 2011
Authored by Subramani Rao

Whitepaper called Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis. Unlike other theoretical studies, this paper lays down the steps involved in implementing these attacks in real time networks. These real time attacks are measured and analyzed using network traffic monitors. In addition to that, this project also details various defense strategies that could be enabled on Cisco routers in order to mitigate these attacks. The detection and mitigation mechanisms designed here are effective for small network topologies and can also be extended to analogous large domains.

tags | paper, denial of service
systems | cisco
SHA-256 | f1811013d7d890533de92c4b33eb002cc4aea6e5e46e851c9ffe27c39fa5f389
Page 1 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close