exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files

Router Exploitation
Posted Nov 23, 2012
Authored by FX | Site recurity-labs.com

This is a presentation called Router Exploitation. It was given at BlackHat 2009. It discusses various vendors such as Cisco, Juniper, Huawei, and more.

tags | paper
systems | cisco, juniper
SHA-256 | d251e8ce38047dd92c1a121ab52dccf2904bfc18ca85475675ae8202a6a1241d

Related Files

Low Level Exploits
Posted Apr 26, 2013
Authored by Hugh Pearse

This is a presentation that discusses low level exploitation such as stack buffer overflows, null pointer exceptions, etc. It offers decent examples and explanations.

tags | paper, overflow
SHA-256 | cf8f57a23f2830b47616375181328e0335105ea381d3428a3f1e91d4ded96b96
SE-2012-01 Devoxx Presentation
Posted Nov 16, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation given at Devoxx that goes into detail about the Oracle Java vulnerabilities discussed in SE-2012-01.

tags | paper, java, vulnerability
SHA-256 | 49d02139ee9c74682ac34a668af63077f0e2e4b0d473c32bb2104c25866d4982
Security Vulnerabilities Of Digital Video Broadcast Chipsets
Posted May 28, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation called Security Vulnerabilities of Digital Video Broadcast Chipsets. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.

tags | paper, vulnerability
SHA-256 | b5085e8431fb1a7e2bbeb1de39c969addc0919c9cb22fbe8c72602adfcfcf41b
Security Threats In Digital Satellite Television
Posted May 28, 2012
Authored by Adam Gowdiak | Site security-explorations.com

This is a presentation called Security Threats in the World of Digital Satellite Television. It is from a talk given at the Hack In The Box security conference in Amsterdam in 2012.

tags | paper
SHA-256 | 61103d4ce9bcf58777deab4ee4ff4c33b39828de0f9c1efaefc51fa159e8fffc
Uncovering ZeroDays And Advanced Fuzzing
Posted May 24, 2012
Authored by Kingcope

This is a presentation called Uncovering ZeroDays and Advanced Fuzzing. It has one PDF of the presentation and one of the full script used during the presentation. This was presented at AthCon 2012.

tags | paper
systems | linux
SHA-256 | ed4e76db85a1968d96d0b168a230dcf62722f0fc8e23574007b3bcc95e50099c
FXRecruiter Shell Upload
Posted Mar 25, 2011
Authored by Ashiyane Digital Security Team

FXRecruiter suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 2e0b852e7bcf48c3e7e34a2e6d42d11674e790de7bf3337b4114e1f2dc06e87a
Microsoft Fax Cover Page Editor 5.2.3790.3959 Code Execution
Posted Jan 21, 2011
Authored by Luigi Auriemma | Site aluigi.org

Microsoft Fax Cover Page Editor version 5.2.3790.3959 suffers from a code execution vulnerability. Proof of concept exploit included.

tags | exploit, code execution, proof of concept
systems | linux
SHA-256 | a3f6948acaffdb44b32f3e6435cb282a054ca4e186fa85c9e03ca616a1f3c675
Introduction To Phishing 3.0 Through Cross Application Scripting
Posted Mar 22, 2010
Authored by emgent

This is a presentation called the Introduction to Phishing 3.0 through Cross Application Scripting. Written in Italian.

tags | paper
SHA-256 | d340c3fa78cbd404b971d40e9140498595b79f10a7ce64c899473b8bec222cc6
HTTP Parameter Pollution
Posted May 19, 2009
Authored by Stefano Di Paola, Luca Carettoni | Site ikkisoft.com

This is a presentation called HTTP Parameter Pollution that focuses on manipulation and injection of HTTP GET/POST parameters.

tags | paper, web
SHA-256 | df989e106011230b8418a8adeaad6d36878992bf93ca8fd2ac0c12fef5be85fa
FX Content Manager Local File Inclusion
Posted Jan 15, 2009
Authored by baltazar | Site darkc0de.com

FX Content Manager local file inclusion exploit.

tags | exploit, local, file inclusion
SHA-256 | 1061b4d4ed08591eb7477e11122172d9f63a2785a6da5bff507ef452c11f5b1a
secure_input_solutions-webapps.pdf
Posted Nov 10, 2008
Authored by Angelo Rosiello | Site rosiello.org

This is a presentation called Discussing Secure Input Solutions for Web Applications.

tags | paper, web
SHA-256 | c4939f36d6f4d8e6061dbda224069e6698567e7333535e7f2608dc1ed0c7d2f0
fxAPPXSS.txt
Posted Jun 12, 2006
Authored by Luny

fx-APP version 0.0.8.1 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 72ed807e2f5df0e7f99d2e6b6b5ef8e4802fe76ba3e54a4cebefe3f58df9bd0f
Page 1 of 1
Back1Next

File Archive:

May 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    15 Files
  • 2
    May 2nd
    16 Files
  • 3
    May 3rd
    38 Files
  • 4
    May 4th
    15 Files
  • 5
    May 5th
    35 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    8 Files
  • 9
    May 9th
    65 Files
  • 10
    May 10th
    19 Files
  • 11
    May 11th
    27 Files
  • 12
    May 12th
    8 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    1 Files
  • 15
    May 15th
    19 Files
  • 16
    May 16th
    66 Files
  • 17
    May 17th
    28 Files
  • 18
    May 18th
    32 Files
  • 19
    May 19th
    13 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    23 Files
  • 23
    May 23rd
    15 Files
  • 24
    May 24th
    49 Files
  • 25
    May 25th
    20 Files
  • 26
    May 26th
    13 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    11 Files
  • 30
    May 30th
    46 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close