what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 82 RSS Feed

Files

Subverting Networks
Posted Apr 11, 2012
Authored by Parul Khanna

This is a brief presentation that touches on various elements of attacks used to cause computer security issues. It is very high level.

tags | paper
SHA-256 | 40bf343ddc6f826bdaa3a6f429164fd979037dafa0de7cfaa4220c3431ebc5aa

Related Files

Everything About The Secure Software Development Process
Posted Jan 9, 2023
Authored by Ismail Tasdelen

This is a brief whitepaper that discusses some basic fundamentals for approaching secure design of an application.

tags | paper
SHA-256 | c962e90a506a04f9658f44421b9bf8e4b0339a1755b66c5c193c109f722ea574
Insecure sprintf Of C
Posted Dec 20, 2021
Authored by x90c

This is a brief write up discussing insecure functions susceptible to classic buffer overflows.

tags | paper, overflow
SHA-256 | 6c56ef6f21fb5c517c4f05fbff6461b2f130d800355ad39593d8b2f06bee3943
Securing Authentication And Authorization
Posted Sep 21, 2021
Authored by Jitendra Kumar Singh

This is a brief whitepaper discussing the securing of authentication and authorization.

tags | paper
SHA-256 | ec474e596a9d9ba2ab9781f4af02b1dee9f12e35a15b86af9d6a4566b3045d04
Wordlist Overview
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that discusses wordlists, where to get them, and when to use them.

tags | paper
SHA-256 | 89e78120ceaeb9a64b5808490e77eb00fad19d19fe3106904104df63dfb37a31
HTTP Host Header Attacks
Posted Apr 22, 2021
Authored by SunCSR

This is a brief whitepaper that discuss HTTP Host header attacks.

tags | paper, web
SHA-256 | a6fa96ce1a609cfb613a8375b0180918f63f56cc17ee3a3c76e0de0ea38c3e92
File Transfer Cheatsheet
Posted Mar 8, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that goes over file transfer mechanisms that can be used on Windows and Linux.

tags | paper
systems | linux, windows
SHA-256 | bb53fbaa2dc352533456cf7d06a33392552c749b608b8e33b3b03227d97e1520
Web Application Reconnaissance And Mapping
Posted Mar 5, 2021
Authored by Rishabh Vats

This is a brief whitepaper that goes over some tooling that can be of assistance while performing reconnaissance against a web application prior to attack.

tags | paper, web
SHA-256 | efa89877156455ecbe4998579276a2b7f88564aac2a446ce3a8fdb5d7a98c52c
Mobile App Security
Posted Dec 9, 2020
Authored by SunCSR, Nghia Van Le

This is a brief whitepaper discussing best practices in mobile application security.

tags | paper
SHA-256 | b1918abbd608009a0920e4a9bc031809a5b57b44c3c36e87343ee875c3173748
Buffer Overflow Quick Guide
Posted Jun 8, 2020
Authored by Poseidon-ng

This is a brief whitepaper that discusses buffer overflows and analysis with the Immunity Debugger.

tags | paper, overflow
SHA-256 | 73127a9cc87fc8a939672df63d83e98a8b71f9eac62cd948cf7afa9a24f08ecb
Fuzzing VIM
Posted Mar 5, 2020
Authored by Dhiraj Mishra

This is a brief whitepaper that discusses fuzzing the VIM editor.

tags | paper
SHA-256 | b961ee5f08adf14aeb3683b15f97a4a747d4d428142b2f7ac487d4c97fc8d786
Sony PlayStation Vita (PS Vita) - How To Find Savedata Exploits
Posted Aug 30, 2019
Authored by TheFloW

This is a brief whitepaper on how to find savedata exploits on Sony PlayStation Vita (PS Vita).

tags | paper
SHA-256 | 188612d0c7a2539a8f339aa1aea144f2e79cae8e31e8f935cf054251a5ed4586
Analysis Using Analytics In Cybersecurity
Posted Aug 8, 2019
Authored by Akash Sarode

This is a brief whitepaper discussing the use of analytics when hunting for threats and notes some open source tools that can provide help.

tags | paper
SHA-256 | 18525786505ac237f2a1eb0774841f333bda5911afa3229941ffeb938eea4c77
Man-In-The-Middling TOR
Posted Dec 19, 2017
Authored by Kr1pt0nGirl

This is a brief whitepaper discussing how to perform man-in-the-middle attacks as an exit node on TOR.

tags | paper
SHA-256 | 0f52accc93bc9d4f2ed2e7393a4bc7289bcd92489c25dd669cea0e8b074a2063
Web Application Penetration Testing Techniques
Posted Jun 15, 2017
Authored by Ahmed Al Mutairi

This is a brief whitepaper written in Arabic that gives some examples of tools that can be used to hack systems.

tags | paper
SHA-256 | 2ae93e8c7e8325d75e32afcbb5a09b54616818e152807f8540adb0a73c0988b2
How To Exploit Magic Values In 32-Bit Processes On 64-Bit OSes
Posted Jun 22, 2016
Authored by SkyLined

This is a brief write-up on how magic values in 32-bit processes on 64-bit OSes work and how to exploit them.

tags | paper
advisories | CVE-2014-1592
SHA-256 | 0e22f4f695fe5a82d5a78008e35426ae71abb83926c813e23d3e43569e903c82
Analysis Of Fake Antivirus Malware Delivery
Posted Feb 24, 2015
Authored by HauntIT

This is a brief whitepaper that documents how the author analyzed malicious javascript and a host used for slinging fake antivirus software.

tags | paper, javascript, virus
SHA-256 | e26853153c11af3c368c496b92cb79cc809c59f6efe56f5c321aefba8a22855c
Open Wi-Fi Hotspots - Threats And Mitigations
Posted Jan 13, 2015
Authored by Renuka Muppavarapu

This is a brief whitepaper that discusses threats and mitigations against those threats when using open wireless access points.

tags | paper
SHA-256 | 0574734d9f9275ddb9dc943efd9df28254d8bcf312ed3e6a17473350b8d1d633
Vulnerability In Popular Plugins
Posted Dec 24, 2014
Authored by HauntIT

This is a brief whitepaper that discusses SQL injection, cross site scripting, and remote shell upload vulnerabilities in various Joomla! plugins.

tags | exploit, remote, shell, vulnerability, xss, sql injection
SHA-256 | 794cddcc554bcd6bb919eccba86c9c7f16316a4cf209458c0e5739cc35e04ba5
PHP Shell Backdoors
Posted Dec 20, 2014
Authored by KnocKout

This is a brief write up noting javascript backdoors left in common PHP shells.

tags | paper, shell, php, javascript
SHA-256 | 5cfb1217e9087a15de79d56e9f05827f2a275f0a080cf8427518a3cba732ef2f
Account Lockouts To Prevent Bruteforcing
Posted Aug 31, 2014
Authored by Abhibandu Kafle

This is a brief whitepaper that provides an analysis of account lockout schemes used to prevent bruteforce attacks.

tags | paper
SHA-256 | 8e18db6be674d94c9a87db4b797085812ec8e170e75ee52055331ec7fa17383e
NULL Page Mitigations On Windows 8 x86
Posted May 22, 2014
Authored by Tavis Ormandy

This is a brief write up that discusses NULL page mitigations on Windows 8 and includes a piece of proof of concept code.

tags | exploit, proof of concept
systems | linux, windows
SHA-256 | a7d45dd13990e785f7ee6bbec647ae6693fc0348799ef70a34911098b0fb2da6
SQL Injection In Insert, Update, And Delete
Posted May 7, 2014
Authored by Osanda Malith

This is a brief whitepaper that goes over different payloads that can be leveraged in SQL injection attacks.

tags | paper, sql injection
SHA-256 | 9499be52d5cfed9d72ecaf10bc20f2276bb6bc14fd6d1eb70d8afca6916fdf70
Exploiting Cisco EPC3925 In The Netherlands
Posted Mar 9, 2014
Authored by s3rgio

This is a brief write up discussing exploitation of the cross site request forgery vulnerability discovered in the Cisco EPC3925 router.

tags | paper, csrf
systems | cisco
SHA-256 | e0e9eb1360b28fa8b096368773821f3b01656d4faedb41fc2062ac1a7094eaff
Pen Test Tips 2
Posted Jan 3, 2014
Authored by David J. Dodd

This is a brief whitepaper that discusses shell access on both Windows and Unix systems and how to obtain better control versus arbitrary command execution.

tags | paper, arbitrary, shell
systems | windows, unix
SHA-256 | cb59a18f0938580f2565d5dbb95ef2e78886586329dfef334a80e2e3a2b58d8e
Twenty Reasons Why Mass Surveillance Is Dangerous
Posted Dec 28, 2013
Authored by cwade12c

This is a brief write-up called Twenty Reasons Why Mass Surveillance Is Dangerous.

tags | paper
SHA-256 | a3b2989e9050e8ee56d2b66ee2be1883dd4ff40472f7b0d217eb8861368e23bf
Page 1 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close