what you don't know can hurt you
Showing 1 - 25 of 79 RSS Feed

Files

XPATH Injection
Posted Oct 2, 2013
Authored by Chetan Soni

This is a brief whitepaper that covers XPATH injection attacks and use cases.

tags | paper
MD5 | 9d0a94c181895a2a10ed0a785f5abcc1

Related Files

Wordlist Overview
Posted Apr 23, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that discusses wordlists, where to get them, and when to use them.

tags | paper
MD5 | fe2c4f9e82dec7e0f4c8b33e49d5612d
HTTP Host Header Attacks
Posted Apr 22, 2021
Authored by SunCSR

This is a brief whitepaper that discuss HTTP Host header attacks.

tags | paper, web
MD5 | a1981f34582f6b20784bc27231fda231
File Transfer Cheatsheet
Posted Mar 8, 2021
Authored by Jeenali Kothari | Site hackingarticles.in

This is a brief whitepaper that goes over file transfer mechanisms that can be used on Windows and Linux.

tags | paper
systems | linux, windows
MD5 | 1a613cf131ca43c9114b0a44d4a09e49
Web Application Reconnaissance And Mapping
Posted Mar 5, 2021
Authored by Rishabh Vats

This is a brief whitepaper that goes over some tooling that can be of assistance while performing reconnaissance against a web application prior to attack.

tags | paper, web
MD5 | c472e5557b1164f9df6424eef530e4bb
Mobile App Security
Posted Dec 9, 2020
Authored by SunCSR, Nghia Van Le

This is a brief whitepaper discussing best practices in mobile application security.

tags | paper
MD5 | 077ad6207fbdc6a00700a76feb4cde0c
Buffer Overflow Quick Guide
Posted Jun 8, 2020
Authored by Poseidon-ng

This is a brief whitepaper that discusses buffer overflows and analysis with the Immunity Debugger.

tags | paper, overflow
MD5 | 8f7fc3fa0d5d5b5b815394c941ee52df
Fuzzing VIM
Posted Mar 5, 2020
Authored by Dhiraj Mishra

This is a brief whitepaper that discusses fuzzing the VIM editor.

tags | paper
MD5 | cbf9769b6b0bca565ecb0c138d7549e2
Sony PlayStation Vita (PS Vita) - How To Find Savedata Exploits
Posted Aug 30, 2019
Authored by TheFloW

This is a brief whitepaper on how to find savedata exploits on Sony PlayStation Vita (PS Vita).

tags | paper
MD5 | 5d95461465519fb5f8b887494aae187a
Analysis Using Analytics In Cybersecurity
Posted Aug 8, 2019
Authored by Akash Sarode

This is a brief whitepaper discussing the use of analytics when hunting for threats and notes some open source tools that can provide help.

tags | paper
MD5 | 02163c74f3fdae2628fa7eea01ef7860
Man-In-The-Middling TOR
Posted Dec 19, 2017
Authored by Kr1pt0nGirl

This is a brief whitepaper discussing how to perform man-in-the-middle attacks as an exit node on TOR.

tags | paper
MD5 | 0397952789142ad6428f23b95f03f8c2
Web Application Penetration Testing Techniques
Posted Jun 15, 2017
Authored by Ahmed Al Mutairi

This is a brief whitepaper written in Arabic that gives some examples of tools that can be used to hack systems.

tags | paper
MD5 | 572bf4e683d8f97acf40bb8d297c0758
How To Exploit Magic Values In 32-Bit Processes On 64-Bit OSes
Posted Jun 22, 2016
Authored by SkyLined

This is a brief write-up on how magic values in 32-bit processes on 64-bit OSes work and how to exploit them.

tags | paper
advisories | CVE-2014-1592
MD5 | 37f2076a2763f2f4cb4bece0777fe356
Analysis Of Fake Antivirus Malware Delivery
Posted Feb 24, 2015
Authored by HauntIT

This is a brief whitepaper that documents how the author analyzed malicious javascript and a host used for slinging fake antivirus software.

tags | paper, javascript, virus
MD5 | 3654b81a0923d7139addc5474f5d80b0
Open Wi-Fi Hotspots - Threats And Mitigations
Posted Jan 13, 2015
Authored by Renuka Muppavarapu

This is a brief whitepaper that discusses threats and mitigations against those threats when using open wireless access points.

tags | paper
MD5 | 896a8d9c6487b5a4a17890527d00de0e
Vulnerability In Popular Plugins
Posted Dec 24, 2014
Authored by HauntIT

This is a brief whitepaper that discusses SQL injection, cross site scripting, and remote shell upload vulnerabilities in various Joomla! plugins.

tags | exploit, remote, shell, vulnerability, xss, sql injection
MD5 | bcb736d35d54e9da1c164ec6404bada8
PHP Shell Backdoors
Posted Dec 20, 2014
Authored by KnocKout

This is a brief write up noting javascript backdoors left in common PHP shells.

tags | paper, shell, php, javascript
MD5 | 465a8584e9016e457c0c418a061e0cce
Account Lockouts To Prevent Bruteforcing
Posted Aug 31, 2014
Authored by Abhibandu Kafle

This is a brief whitepaper that provides an analysis of account lockout schemes used to prevent bruteforce attacks.

tags | paper
MD5 | cdf45eeb78c5e12a7e534bcd95a8b7ce
NULL Page Mitigations On Windows 8 x86
Posted May 22, 2014
Authored by Tavis Ormandy

This is a brief write up that discusses NULL page mitigations on Windows 8 and includes a piece of proof of concept code.

tags | exploit, proof of concept
systems | linux, windows
MD5 | 73e524a4ddc4355c68f3fdb4ff3a21ef
SQL Injection In Insert, Update, And Delete
Posted May 7, 2014
Authored by Osanda Malith

This is a brief whitepaper that goes over different payloads that can be leveraged in SQL injection attacks.

tags | paper, sql injection
MD5 | 5cbd0e55c570992f600f2d3c243a4f20
Exploiting Cisco EPC3925 In The Netherlands
Posted Mar 9, 2014
Authored by s3rgio

This is a brief write up discussing exploitation of the cross site request forgery vulnerability discovered in the Cisco EPC3925 router.

tags | paper, csrf
systems | cisco
MD5 | 6c2e7a9baecf07b4701344e74d2cdf35
Pen Test Tips 2
Posted Jan 3, 2014
Authored by David J. Dodd

This is a brief whitepaper that discusses shell access on both Windows and Unix systems and how to obtain better control versus arbitrary command execution.

tags | paper, arbitrary, shell
systems | windows, unix
MD5 | b7000f85522c9f4734121bc630ba85d8
Twenty Reasons Why Mass Surveillance Is Dangerous
Posted Dec 28, 2013
Authored by cwade12c

This is a brief write-up called Twenty Reasons Why Mass Surveillance Is Dangerous.

tags | paper
MD5 | 8474614a14d84a935f76902e7e30bc11
64-bit calc.exe Stack Overflow Root Cause Analysis
Posted Dec 22, 2013
Authored by Dark-Puzzle

This is a brief write up discussing a root cause analysis of why spawning calc.exe triggered a stack overflow.

tags | paper, overflow, root
MD5 | 6cf6663c4ae9aadd82ad553d36e41a07
D-Link DSR Router Remote Root Shell Overview
Posted Dec 7, 2013
Authored by 0_o

This is a brief overview of the unauthenticated non-persistent remote root shell vulnerability in various D-Link DSR routers. Versions affected include D-Link DSR-150 (Firmware < v1.08B44), D-Link DSR-150N (Firmware < v1.05B64), D-Link DSR-250 and DSR-250N (Firmware < v1.08B44), D-Link DSR-500 and DSR-500N (Firmware < v1.08B77), D-Link DSR-1000 and DSR-1000N (Firmware < v1.08B77).

tags | advisory, remote, shell, root
advisories | CVE-2013-5945, CVE-2013-5946
MD5 | 06d88b1f171a83bbb10d75321ef81155
Linux Kernel Patches
Posted Oct 14, 2013
Authored by x90c

This is a brief whitepaper that discusses various Linux kernel patches.

tags | paper, kernel
systems | linux
MD5 | 2c3fc5ac34f881418e756971c762ccb0
Page 1 of 4
Back1234Next

File Archive:

June 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    35 Files
  • 2
    Jun 2nd
    14 Files
  • 3
    Jun 3rd
    40 Files
  • 4
    Jun 4th
    22 Files
  • 5
    Jun 5th
    1 Files
  • 6
    Jun 6th
    1 Files
  • 7
    Jun 7th
    19 Files
  • 8
    Jun 8th
    14 Files
  • 9
    Jun 9th
    39 Files
  • 10
    Jun 10th
    20 Files
  • 11
    Jun 11th
    22 Files
  • 12
    Jun 12th
    2 Files
  • 13
    Jun 13th
    1 Files
  • 14
    Jun 14th
    32 Files
  • 15
    Jun 15th
    34 Files
  • 16
    Jun 16th
    9 Files
  • 17
    Jun 17th
    33 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close