the original cloud security
Showing 1 - 25 of 74 RSS Feed

Files

Insecure Authentication Control In J2EE
Posted Dec 28, 2012
Authored by Ashish Rao

This is a whitepaper discussing insecure authentication control in J2EE implemented using sendRedirect().

tags | paper, java
MD5 | 63b4626d897f0863618933ab96229759

Related Files

Web Services Penetration Testing
Posted Apr 17, 2017
Authored by Firat Celal Erdik, Mert Tasci

This is a whitepaper that discussing penetration testing against web services. Written in Turkish.

tags | paper, web
MD5 | 0d44214ba96b783c46bbca2a6e34d070
Analysis Of The Ivyl Sample Kernel Rootkit
Posted Feb 21, 2017
Authored by x90c

This is a whitepaper providing an analysis of the Ivyl sample kernel rootkit. Written in Korean.

tags | paper, kernel
MD5 | 4baeea8a46ff0f645b75fb0fa6a0314f
Injecting SQLite Database-Based Application
Posted Feb 19, 2017
Authored by Manish Tanwar

This is a whitepaper that discusses leveraging SQL injection attacks against SQLite databases.

tags | paper, sql injection
MD5 | 5d5a3664bfa800fd6c41493052b37555
Cloud Forensics
Posted Jan 14, 2017
Authored by Preet Shah

This is a whitepaper that covers basic cloud computer concepts, forensics, and challenges surrounding investigations.

tags | paper
MD5 | 0e4e3c4a10a0262519bcd94790ec0c7a
Web Security Vulnerabilities
Posted Oct 17, 2016
Authored by Mehmet Kelepc

This is a whitepaper discussing web security vulnerabilities. Written in Turkish.

tags | paper, web, vulnerability
MD5 | ac2f8b7fb36b0fa25ed9e0a5e96cdafb
Important Tips For Using Wireshark
Posted Oct 3, 2016
Authored by Meryem AKDOGAN

This is a whitepaper discussing important tips for using Wireshark. Written in Turkish.

tags | paper
MD5 | 4c1ee0c737c3bbfefc83d315eceae516
Protecting IIS With Apache Mod Proxy And Dotdefender WAF
Posted Mar 17, 2015
Authored by Akastep

This is a whitepaper discussing using Apache with mod_proxy and Dotdefender to protect IIS installs. Written in Azerbaijani.

tags | paper
MD5 | d52a48cac7f353140489e0ea242197fc
How To Secure Against Glibc Ghost Vulnerability
Posted Jan 30, 2015
Authored by Rajivarnan.R

This is a whitepaper discussing mitigation of the Ghost glibc vulnerability as discussed in CVE-2015-0235.

tags | paper
advisories | CVE-2015-0235
MD5 | bc12f4d4fdbf708346109df88f91587f
Nmap Port Scanning: A Practical Approach Modified For Better
Posted Dec 4, 2014
Authored by Florian MINDZSEC

This is a whitepaper that goes into detail on the functionality and usage of nmap for portscanning.

tags | paper
MD5 | e56f786be37d0d1207d47d1fbe093f1a
Exploitation Of Hash Functions
Posted Aug 26, 2014
Authored by Deepanshu Khanna

This is a whitepaper that touches on various cryptography and discusses hash functions at a slightly greater length.

tags | paper
MD5 | 67bf0fb9a7af19573e2642a0ce66cc37
Hacking ASP/ASPX Websites Manually
Posted Jun 30, 2014
Authored by Chetan Soni

This is a whitepaper that goes into detail on hacking ASP/ASPX websites manually.

tags | paper, asp
MD5 | d56d34728763832f62fc8b57670829be
TP-Link TD-W89 Exploitation
Posted May 16, 2014
Authored by t3h n00b

This is a whitepaper that goes into detail on downloading configuration files and exploiting the TP-Link TD-W89.

tags | paper
MD5 | 9a8dee90d04b284c9927739cba820816
Uploading PHP Shell Through SQL Injection
Posted Mar 20, 2014
Authored by 6_Bl4ck9_f0x6

This is a whitepaper that goes into detail on how a PHP shell can be uploaded when leveraging SQL injection.

tags | paper, shell, php, sql injection
MD5 | 377a307547c20c1f4f6f7cc1bcca3a24
The Art Of Stealth Scanning
Posted Mar 11, 2014
Authored by Fardin Allahverdinazhand

This is a whitepaper called the Art of Stealth Scanning. It is written in Persian.

tags | paper
MD5 | aa52196ed35b1a79dd6ab972a5d542ec
Clamwin Antivirus Bypass Methodology
Posted Feb 17, 2014
Authored by Freebyte

This is a whitepaper discussing the bypassing of Clamwin Antivirus. Written in Azerbaijan.

tags | paper, bypass
MD5 | bc2e8d077733bf8e8632f4cc642685a0
Discovery Of RPC Vulnerabilities
Posted Feb 6, 2014
Authored by Celil Unuver

This is a whitepaper discussing the discovery of RPC vulnerabilities. Written in Turkish.

tags | paper, vulnerability
MD5 | a083cba8ae639b6832e908717375965a
Cookies
Posted Jan 20, 2014
Authored by F4RY4R_RED

This is a whitepaper discussing the use of cookies. Written in Persian.

tags | paper
MD5 | 4a191ed7e91ca36a68d86936feac5826
Heap Spraying - Active-X Controls Under Atatck
Posted Jan 17, 2014
Authored by Ashfaq Ansari

This is a whitepaper that discusses using heap sprays with vulnerable active-x controls.

tags | paper, activex
MD5 | 7b21cd751482e2d3247bda57d1a1cf23
Fuzzing And Software Vulnerabilities Part 1
Posted Oct 24, 2013
Authored by Ibrahim Balic

This is a whitepaper discussing fuzzing and software vulnerabilities. This is part one. It is written in Turkish.

tags | paper, vulnerability
MD5 | 4055fb18d4267897853fae3e14b0e3b6
Metasploit - The Exploit Learning Tree
Posted Aug 29, 2013
Authored by Mohan Santokhi

This is a whitepaper called Metasploit - The Exploit Learning Tree. Instead of being just another document discussing how to use Metasploit, the purpose of this document is to show you how to look deeper into the code and try to decipher how the various classes and modules hang together to produce the various functions.

tags | paper
MD5 | 39928e924c6c07063963edbf2916d536
Taint Analysis And Pattern Matching With Pin
Posted Aug 9, 2013
Authored by Jonathan Salwan

This is a whitepaper called Taint analysis and pattern matching with Pin. All examples in this document are considered a proof of concept and are meant to give others ideas.

tags | paper, proof of concept
MD5 | c5ef0ac5a3d4879f18e7d2cc93faa32f
JDWP Exploitation
Posted Jul 24, 2013
Authored by prdelka

This is a whitepaper discussing arbitrary java code execution leveraging the Java Debugging Wire Protocol (JDWP).

tags | exploit, java, arbitrary, code execution, protocol
MD5 | d2393fd5c46ac860e38c29fc4e30d965
Simple Weevely Guide
Posted Jul 2, 2013
Authored by n4sss

This is a whitepaper called Simple Weevely Guide. It is written in Portuguese.

tags | paper
MD5 | abe21b22c2a43987f5ed6fab30bf9a2f
Digital Satellite Receiver And Safety
Posted Jun 27, 2013
Authored by Tacettin Karadeniz

This is a whitepaper called Digital Satellite Receiver and Safety. Written in Turkish.

tags | paper
MD5 | 6b5a5f5647593e1c3c6c4aba4892dbb1
SMB Hijacking
Posted Jun 20, 2013
Authored by Ares

This is a whitepaper called SMB Hijacking. Kerberos is defeated.

tags | paper
MD5 | 73290b16840c8910c5598367eb553dfa
Page 1 of 3
Back123Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    6 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close