exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 84 of 84 RSS Feed

Files

Failure To Restrict Access
Posted May 23, 2012
Authored by Fernando Andina, Jose Miguel Soriano

This is a brief whitepaper discussing methods of validating a lack of access restriction for various pages on sites. It discusses everything from visual viewing and comparison between cookies used and using an implementation of the Damerau-Levensthein model. They also have a tool for download.

tags | paper
SHA-256 | 31d9e05acf124177223516cb1f5af275440df270565ba8c268e0a05a6c2aa2ee

Related Files

Faster Blind MySQL Injection Using Bit Shifting
Posted Mar 30, 2011
Authored by Jelmer de Hen | Site h.ackack.net

This is a brief whitepaper called Faster Blind MySQL Injection Using Bit Shifting.

tags | paper, sql injection
SHA-256 | 0b29a9d07c2c7fc32795bd6b3d988ecd3c3db65a90e7ddf57718b11ea059557f
DNS Spoofing With Scapy
Posted Mar 23, 2011
Authored by yur4kh4

This is a brief write up with examples on how to perform DNS spoofing using Scapy. Written in Indonesian.

tags | paper, spoof
SHA-256 | fda8f6b2be4199e0eb722ba337268ab1fadf3a12c254a57601fb651642c27475
Brief Whitepaper On Risk Management
Posted Mar 21, 2011
Authored by Cygog

This is a brief whitepaper detailing risk management, or Gestion De Riesgos. Written in Spanish.

tags | paper
SHA-256 | f789c890534783007f92e8397c0db8825e91423bc0e8fd272df2b9b182ddb4c7
Blackboxes - Owning Broadband Routers
Posted Jan 20, 2010
Authored by ShadowHatesYou

This is a brief whitepaper discussing how to own Blackboxes (typical broadband routers such as SB5120s, SMC Connect, D-Link dcm-202s, Toshiba PCX2600s, and a handful of RCA and Linksys modems).

tags | exploit
SHA-256 | 3fddebbe2117f3e5ef8cfb311b1cbed6273259f1ba1d32bd24a8c18db80cd5b4
TCP Session Hijacking
Posted Jan 11, 2010
Authored by Cheese | Site mycheese.org

This is a brief whitepaper discussing TCP session hijacking.

tags | paper, tcp
SHA-256 | 29ad65fefcde17cae95eb16aa1b853b78890e0c39b7905adca97de024a792b97
Tutorial On Remote / Local File Inclusion
Posted Aug 6, 2009
Authored by int_main();

This is a brief tutorial on remote and local file inclusion attacks. Written in German.

tags | paper, remote, local, file inclusion
SHA-256 | 4a3e6145d0a0a7301e5157b69be48a9913d2849e368c4a7e5d9a8eadfe0c6bcb
Whitepaper About Blind SQL Injection
Posted Aug 6, 2009
Authored by MizoZ

This is a brief write up discussing blind SQL injection attacks. Written in French.

tags | paper, sql injection
SHA-256 | 850e44ffacd06e23d7caec378232e76af6b7f4ef2eb9209c89c61b21dba24190
FailureToLaunch-2.pl.txt
Posted Jul 2, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function. PPC version.

tags | exploit, ppc, proof of concept
systems | apple, osx
SHA-256 | 219477bc10fd86f44e79866b7a5a535c7bfad56e533185cc869da47f54021bdf
FailureToLaunch.pl.txt
Posted Jul 2, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

Proof of concept exploit for Mac OS X versions 10.4.6 and below which are susceptible to a vulnerability in launchd's syslog() function.

tags | exploit, proof of concept
systems | apple, osx
SHA-256 | dda0b65f359384ab350d9017041509539f3b96081550de30781a83c0f6e82742
Page 4 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close