exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files

Forensic Analysis Of iPhone Backups
Posted Jul 12, 2012
Authored by Satish Bommisetty

This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups.

tags | paper
systems | apple, iphone
SHA-256 | 91d87e6d4d62c26dfb2d234b849782b8cc383017bef870f2d1f7066ccb41ab9f

Related Files

Cybersecurity In Industry 4.0 And Smart Manufacturing
Posted Sep 25, 2023
Authored by Erhan YAZAN

Whitepaper called Cybersecurity in Industry 4.0 and Smart Manufacturing: The Rise of Security in the Age of IoT, IIoT, ICS, and SCADA. This article examines Industry 4.0's relationship with the rapidly developing technologies Internet of Things (IoT), Industrial Internet of Things (IIoT), Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) and why cyber security is important in these areas.

tags | paper
SHA-256 | 0458410365974be314b620bd7944a4541658322fd5a9cee88134e46a6317b29b
Intel x86 Considered Harmful
Posted Oct 29, 2015
Authored by Joanna Rutkowska

This article examines the security challenges facing us on modern off-the-shelf hardware, focusing on Intel x86-based notebooks. The question the author will try to answer is: can modern Intel x86-based platforms be used as trustworthy computing platforms? The paper looks at security problems arising from the x86's over-complex firmware design (BIOS, SMM, UEFI, etc.), discuss various Intel security technologies (such as VT-d, TXT, Boot Guard and others), consider how useful they might be in protecting against firmware-related security threats and other attacks, and finally move on to take a closer look at the Intel Management Engine (ME) infrastructure.

tags | paper, x86
SHA-256 | 21aff52a293ba0e23ed85f93772ac4823589aaf5b93e76d95c0c62d46c9ba78d
iPhone Forensics On iOS 5
Posted Jan 20, 2012
Authored by Satish Bommisetty

This is a brief whitepaper discussing how to perform forensics on iOS 5 on the iPhone.

tags | paper
systems | apple, iphone
SHA-256 | 343b3862d39127f659978159079fb88e96475725f86982f827ebd28b23cbf412
iPhone4 FTP Server 1.0 Remote Crash
Posted May 31, 2011
Authored by offsetIntruder

iPhone4 FTP Server 1.0 empty CWD-RETR remote crash denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 475b9126b494053efc37cc13c7a6fa63dedf0a3b5b6cfad131b1b11adc82d7a6
iPhone MyDocs 2.7 Directory Traversal
Posted Feb 25, 2011
Authored by IRCRASH, Khashayar Fereidani | Site ircrash.com

iPhone MyDocs version 2.7 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
systems | apple, iphone
SHA-256 | fae04cfee781085d2fd6f8575af3648f4d7585f0588a5efb5b7bb8d73098d99c
iPhone iFile 2.0 Directory Traversal
Posted Feb 25, 2011
Authored by IRCRASH, Khashayar Fereidani | Site ircrash.com

iPhone iFile version 2.0 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
systems | apple, iphone
SHA-256 | aff27d1aa9bc27dc2109e98973b6ef23d319663bb2a0db4d43129ef37389f697
iPhone Folders 2.5 Directory Traversal
Posted Feb 25, 2011
Authored by IRCRASH, Khashayar Fereidani | Site ircrash.com

iPhone Folders version 2.5 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
systems | apple, iphone
SHA-256 | 1062f972a62f2727426510070897b782cbcae9833e2586c9aff82fee5f8b0622
iPhone PDF Reader Pro 2.3 Directory Traversal
Posted Feb 24, 2011
Authored by IRCRASH, Khashayar Fereidani | Site ircrash.com

iPhone PDF Reader Pro version 2.3 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
systems | apple, iphone
SHA-256 | 02569250d98ac973880f7a0c81ec18308ea71d7ca1f8682ab0cc5361fd1e164d
iPhone Guitar Directory Traversal
Posted Feb 24, 2011
Authored by IRCRASH, Khashayar Fereidani | Site ircrash.com

iPhone Guitar suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
systems | apple, iphone
SHA-256 | 4d6bbf24558d8c444994bad35d232a50db125fb42a1cb34a6c171395a16db4c9
iPhone iShred 1.93 Directory Traversal
Posted Feb 24, 2011
Authored by IRCRASH, Khashayar Fereidani | Site ircrash.com

iPhone iShred version 1.93 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
systems | apple, iphone
SHA-256 | 2672bdf8a12f0f6096e4749c6433401c5e9cc241b2079f7198e3fa31e50cdc1c
Apple iPhone Safari JS Crash Exploit
Posted Dec 22, 2010
Authored by Pr0T3cT10n

Apple iPhone Safari JS remote crash denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
systems | apple, iphone
SHA-256 | bff45cf21bd0088c6b08763304e6028aacae1aa67e0646d0ae1cec5858940453
Apple iPhone Safari decodeURI Crash
Posted Dec 21, 2010
Authored by Pr0T3cT10n

Apple iPhone Safari decodeURI remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
systems | apple, iphone
SHA-256 | bc4130146f2131ce06626c02f3eba4f95821c02964b026ea7262cc3cb813c93a
Apple iPhone Safari decodeURIComponent Crash
Posted Dec 21, 2010
Authored by Pr0T3cT10n

Apple iPhone Safari decodeURIComponent remote denial of service proof of concept exploit.

tags | exploit, remote, denial of service, proof of concept
systems | apple, iphone
SHA-256 | 9fe87f9c1607655d89dfbc39b0e9597404289c6c4082f9248276f64a63195b4f
Apple iPhone Safari Denial Of Service
Posted Dec 20, 2010
Authored by Pr0T3cT10n

Apple iPhone Safari body alink remote denial of service crash exploit.

tags | exploit, remote, denial of service
systems | apple, iphone
SHA-256 | 3c0108e5612d1fe838b573422e1fbf4649d1c91f9712951d7bcf7e92f097553e
iPhone Springboard Malformed Character Crash
Posted Mar 16, 2010
Authored by Chase Higgins

iPhone Springboard crash proof of concept exploit.

tags | exploit, proof of concept
systems | apple, iphone
SHA-256 | 3ce07355bc8e127714ff880ad5be00ba97a58f5f869ce567e7df743e45dc53ad
iPhone CSS::Selector Crash Exploit
Posted Feb 25, 2010
Authored by Chase Higgins

iPhone CSS::Selector crash exploit that acts as a web server that sends a malformed long string to the CSS style tag.

tags | exploit, web
systems | apple, iphone
SHA-256 | d71ada90483a76b113062fdae1846313e113c33c00836ca4c4a16526a4b6222b
iPhone - FTP Server (WiFi FTP) Denial Of Service
Posted Feb 25, 2010
Authored by b0telh0

iPhone - FTP Server (WiFi FTP) remote denial of service exploit.

tags | exploit, remote, denial of service
systems | apple, iphone
SHA-256 | 20f5fc853ac2c74665d032592d61e75ce02d1a15d667657d545c02df9f22ef1e
iPod/iPhone E-Mail Man In The Middle
Posted Sep 19, 2009
Authored by William Borskey

The standard e-mail application that comes with the iPod and iPhone suffers from a man in the middle vulnerability due to not validating SSL certificates.

tags | advisory
systems | apple, iphone
SHA-256 | bac88e063695c7f4ceb162add1f4a3f7f90de5e74efea5e40f7b28a7f59a10f9
iPhone Safari Crash Exploit
Posted Sep 15, 2009
Authored by cloud

Apple Safari on iPhone remote crash exploit.

tags | exploit, remote
systems | apple, iphone
SHA-256 | fb2b42363d6b75defd7ed00ce5558c9b250b67b7655304ea472eae317a2e1562
iPhone Safari Auto-Open
Posted Jul 7, 2009
Authored by Max Moser | Site remote-exploit.org

iPhones running OS 3 have a usability feature where Safari is launched immediately when joining a network. This allows rogue access points a known vector of attack.

tags | advisory
SHA-256 | f048f1ea52e449199ae2c08e3b737c937896e873aa379fa8eee444f3b52c3198
iPhone Safari Phone Auto Dial
Posted Jun 19, 2009
Authored by Collin Mulliner

Safari on the Apple iPhone suffers from a vulnerability that allows an attacker to auto-dial a number.

tags | exploit
systems | apple, iphone
SHA-256 | 750d96b2e5b025f4f460cec5ea7897e6f417588a419c661fea5d7b95be167b5c
Defeating The iPhone Passcode
Posted Mar 3, 2009
Authored by Brad Antoniewicz

Whitepaper called Defeating the iPhone Passcode.

tags | telephony
systems | apple, iphone
SHA-256 | 4057ba42acd5baab592ee9f0a9a299e6dee396369e8d1034ae8a86a9271d0b89
iphonedbg-toolkit-1.01.tgz
Posted Jun 17, 2008
Authored by Nicolas A. Economou | Site oss.coresecurity.com

The iPhoneDbg Toolkit is a set of tools that will enable you to delve into iPhone binary reversing. The iPhone Debugger allows you to debug running or newly-created native processes inside iPhone. The Library Loader Patcher will allow to debug iPhone libraries. You can also build a tunnel from your PC to your iPhone through USB.

tags | telephony
systems | apple, iphone
SHA-256 | 0ea5823207e04dbd5830b75e63089a1538555633f849c44b20a82e8b3108af90
iphone-dos.txt
Posted Jan 25, 2008
Authored by c0ntex | Site open-security.org

Apple iPhone version 1.1.2 remote denial of service exploit that makes use of Safari.

tags | exploit, remote, denial of service
systems | apple, iphone
SHA-256 | 17140e6c36e864614e1b0e826b1502ce79daef78f7a984b8311fb4fa3f9b5010
iphone.tgz
Posted Oct 12, 2007
Authored by Niacin, Dre | Site toc2rta.com

Apple iTouch/iPhone version 1.1.1 tif file remote jailbreak exploit.

tags | exploit, remote
systems | apple, iphone
SHA-256 | 76eecc62ef34b435ef9dfe00b0a4110beda66eb0000f383f69957a7f846df1e1
Page 1 of 2
Back12Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close