exploit the possibilities
Showing 1 - 25 of 100 RSS Feed

Files

Detecting And Exploiting XSS With Xenotix XSS Exploit Framework
Posted Sep 12, 2012
Authored by Ajin Abraham

This is a whitepaper called Detecting and Exploiting XSS with Xenotix XSS Exploit Framework.

tags | paper, xss
SHA-256 | 59617105598315038569fcdcfa35beec89bf540f72b53763cb4364b163e8cd38

Related Files

DNS Spoofing
Posted Dec 16, 2021
Authored by Rodriguez Padilla Luis, Cortes Leyva Carla

This is a whitepaper that discusses DNS spoofing. Written in Spanish.

tags | paper, spoof
SHA-256 | f2ea4bf58281fa68bc973561373c15277c62566c003a2f7a9096cddecd79929e
Local Administrator Is Not Just With Razer.. It Is Possible For All
Posted Aug 25, 2021
Authored by Lawrence Amer

This is a whitepaper that discusses additional vectors of attack that can be used against Razer products.

tags | paper
SHA-256 | d896ee68726d14957e7b9ef3ead4ea6080977a3951b1f9246dab51ea5e04be7c
PIP Vulnerability In Android 11
Posted Aug 16, 2021
Authored by Akshay Sharma, Tanmay Tyagi, Abhinav

This is a whitepaper that gives an overview of the PIP vulnerability in Android 11.

tags | paper
SHA-256 | de30f374a906fe8d9c0d8bb8b7dfebcf0db353f3671a5b1d8f515460f9e6c36d
XAMPP File Overwrite Vulnerability
Posted Jun 3, 2021
Authored by Ravindu Priyankara

This is a whitepaper that details exploitation of the XAMPP file overwrite vulnerability.

tags | paper
SHA-256 | 599c840a9119e2c8108281701779707886926208b2da13457cc0150074c5afdf
WordPress Plugins Analysis
Posted Apr 21, 2021
Authored by HitmanAlharbi

This is a whitepaper called WordPress Plugins Analysis.

tags | paper
SHA-256 | d0c46ffe0b264d4c36f2a1a05d4c226cc68de98deaf9573d56409ad0026d1d33
GraphQL Attack
Posted Mar 30, 2021
Authored by SunCSR

This is a whitepaper that discusses attacking GraphQL.

tags | paper
SHA-256 | aa2a135e3c79bce67c8da5438837eb4be4d82d6384d4352b498bfce711c37beb
Neo LMS / Matrix LMS Cross Site Scripting
Posted Feb 19, 2021
Authored by Mauro M.

This is a whitepaper that details identifying cross site scripting vulnerabilities in both the Neo and Matrix LMS codebase.

tags | exploit, paper, vulnerability, xss
SHA-256 | 425783c0a58f4b3d8ceaa1ef51c78b248dc59a4e994ea242a952886897d53b3d
Unmasking Hidden Sites
Posted Dec 21, 2020
Authored by labrat

This is a whitepaper that discusses unmasking hidden sites behind Cloudflare an Tor.

tags | paper
SHA-256 | 55b41d984f3de143bc1ab3d75c2bfb2181b35277644bc2e08ecee6160697f930
APK Testing Report
Posted Jul 14, 2020
Authored by Rahul Jangra

This is a whitepaper called APK Testing Report. It goes through various tooling used to analyze devices.

tags | paper
SHA-256 | e7e292f4deaf2d179fba420362d70e5c6cc318e28dffe69d1e55a44b7ce8fe88
Cloud As An Attack Platform
Posted Jun 17, 2020
Authored by Akbar Siami Namin, Faranak Abri, Keith S. Jones, Prerit Datta, Moitrayee Chatterjee

This is a whitepaper that presents an exploratory study of responses from 75 security professionals and ethical hackers in order to understand how they abuse cloud platforms for attack purposes. The participants were recruited at the Black Hat and DEF CON conferences. The researchers presented the participants with various attack scenarios and asked them to explain the steps they would have carried out for launching the attack in each scenario. Participants' responses were studied to understand attackers' mental models, which would improve their understanding of necessary security controls and recommendations regarding precautionary actions to circumvent the exploitation of clouds for malicious activities. They observed that in 93.78% of the responses, participants are abusing cloud services to establish their attack environment and launch attacks.

tags | paper
SHA-256 | 55854ee2c23a225a399933b2397503589cceb96dd36c5a8986a11eb73227e97e
Centreon 19.10-3.el7 SQL Injection
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote SQL injection vulnerabilities in Centreon version 19.10-3.el7.

tags | exploit, paper, remote, vulnerability, sql injection
SHA-256 | 02221a056ccb54bfaed855a9ef6741e6737b01e06fc5841d931b5745c69e5e8b
Symantec Web Gateway 5.0.2.8 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, vulnerability, code execution
SHA-256 | c5c75f2da8676e6edfc6cc37ea4ac20e90be1d12275b0fce452c5c10d306afe6
ManageEngine 14 Remote Code Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.

tags | exploit, paper, remote, vulnerability, code execution
SHA-256 | 55f884e3a3e6704c111f4ff046bd4931087255499a9ead8d4d9832ca49c77691
NagiosXI 5.6.11 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.

tags | exploit, paper, remote, vulnerability, proof of concept
SHA-256 | c13f3213213baa28e248e4dc73e332bc336b5d187686a95ad2ef8b57a7b36938
Symantec Web Gateway 5.0.2.8 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.

tags | exploit, paper, remote, web, proof of concept
SHA-256 | 9876efa02a9403b13e3814ee5a4409950bf50bd73e0e3c6f43ee673c60841a3e
NagiosXI 5.6 Remote Command Execution
Posted Apr 8, 2020
Authored by Cody Sixteen

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.

tags | exploit, paper, remote, proof of concept
SHA-256 | 8cd9a562fc422fbab693c7375a6d77afbff17c5e7e25cd997d8290beae82bbe2
Active Directory DCSync
Posted Apr 6, 2020
Authored by Haboob Team

This is a whitepaper that discusses using DCSync to pull password hashes from a domain controller.

tags | paper
SHA-256 | e14b464d7c303fba5728ee884839d733cf9da1cb6bbb6f3af26614652cc21681
Jumping Firewall With Tunneling Techniques
Posted Apr 30, 2019
Authored by Muhammet Ates

This is a whitepaper that discusses bypassing a firewall using tunneling techniques. Written in Turkish.

tags | paper
SHA-256 | c7b022d8f98bd3ad2bc62318bb20cac8cf163c3c7c88fb40ba138d97d7c4b302
WordPress Security
Posted Oct 5, 2018
Authored by Behrouz Mansoori

This is a whitepaper that provides an overview on WordPress Security. Written in Persian.

tags | paper
SHA-256 | d22218ad1594c053cb1ee1157adae795a1d60e443169f78cd2050fa557349319
Linux Kernel Vulnerability Exploitation
Posted Mar 22, 2018
Authored by x90c

This is a whitepaper providing a Linux kernel hacking introduction. Written in Korean.

tags | paper, kernel
systems | linux
SHA-256 | 70b905774f039dbf1b79d316a75a314dd09b5e5f02ba71bf7dc495772f69434c
Web Application Penetration Testing
Posted Mar 20, 2018
Authored by Manh Pham Tien

This is a whitepaper that goes over methodologies for web application penetration testing. It is very thorough with examples and overviews.

tags | paper, web
SHA-256 | 5f258ff9e75dba499306df2a06fa89e9eebcc2fd3b3ee0b82a6a2a06f26b66fd
Analyze And Attack SSH Protocol
Posted Mar 16, 2018
Authored by Tham Khao

This is a whitepaper discussing analyzing and attacking the SSH protocol. Written in Vietnamese.

tags | paper, protocol
SHA-256 | 3c0940d50691503ff7886f4897a97649067e005c53e3ce4c8cc33ecd573a82b1
Sony Playstation 4 (PS4) WebKit setAttributeNodeNS Use-After-Free
Posted Mar 2, 2018
Authored by Specter

This is a whitepaper describing the Sony Playstation 4 (PS4) webkit setAttributeNodeNS use-after-free vulnerability.

tags | advisory, paper
SHA-256 | 14a01bece77ecdc9d7053e8a98f004b5c09d8502486e1d85f81508e652194877
Pivoting (Metasploit)
Posted Jan 23, 2018
Authored by Anurag Srivastava

This is a whitepaper that discusses pivoting attacks with Metasploit. Pivoting is a technique using a compromised system to attack other systems on the same network. Consider a scenario where there is some juicy information hosted inside a local network and there is only one system which is connected to internet. In this scenario, an attacker can compromise the system which is connected to internet and then use that particular compromised system in-order to test or attack other systems in the same network which are only accessible via local network.

tags | paper, local
SHA-256 | 33ab5236cd107568dfd2b0fa53e275b3fac5c53227e58d23cc60eab82d6b07e7
Web Services Penetration Testing
Posted Apr 17, 2017
Authored by Firat Celal Erdik, Mert Tasci

This is a whitepaper that discussing penetration testing against web services. Written in Turkish.

tags | paper, web
SHA-256 | 4883e0979bed91e02253acc95f59113aa6d85ba94b5cdfa5e26ea275754dd7e0
Page 1 of 4
Back1234Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close