exploit the possibilities
Showing 1 - 25 of 100 RSS Feed

Files

Different Rewrite Methods Available With mod_rewrite For Blacklisting
Posted Nov 18, 2013
Authored by Chetan Soni

This whitepaper goes into detail and multiple different ways you can using blacklisting with mod_rewrite.

tags | paper
MD5 | e1a99b339a877a08ac486b19c19ee03b

Related Files

Chinese Attack On USIS Exploiting SAP Vulnerability
Posted Jul 15, 2015
Authored by ERPScan Research Team | Site erpscan.com

This whitepaper contains research details an attack timeline, documents what vulnerability was exploited, and provide recommendations on how to avoid data breaches in SAP systems.

tags | paper
MD5 | 9feb968a62c00d045d48c202cb454cf7
Privilege Escalation Via Client Management Software Part 2
Posted Jul 14, 2015
Authored by Matthias Deeg

This whitepaper deals with local privilege escalation attacks via exploiting vulnerabilities in the client management software Empirum.

tags | paper, local, vulnerability
MD5 | a4a539ed8eaf700c2a49415c1750a7f5
Privilege Escalation Via Client Management Software Part 1
Posted Jul 14, 2015
Authored by Matthias Deeg

This whitepaper deals with local privilege escalation attacks via exploiting vulnerabilities in the client management software FrontRange DSM.

tags | paper, local, vulnerability
MD5 | c4857aadc3171182697bcaff28bbaff5
Identifier-Based XSSI Attacks
Posted Apr 15, 2015
Authored by Takeshi Terada

This whitepaper focuses on a method of stealing data as a client side script's identifier (variable or function name). The author describes these attack techniques / browser vulnerabilities and then discuss countermeasures for these issues.

tags | paper, vulnerability
advisories | CVE-2014-6345, CVE-2014-7939
MD5 | e98d3ff3c3c341cc27282806d140312b
Denial Of Service Attacks In Wireless Networks
Posted Jan 25, 2015
Authored by Mallikarjun Hangargi

This whitepaper discusses denial of service attacks carried out in WLANs at the physical and MAC layers. It touches on IEEE 802.11 protocol flaws for handling frames at the MAC layer, preventive measures for DoS attacks, and protocol design suggestions.

tags | paper, denial of service, protocol
MD5 | ffd7ad691a5197e6b9af1e807999dbc6
APT - Incident Response Methodologies And Effectiveness
Posted Dec 18, 2014
Authored by Lokesh Pidawekar | Site infosecforever.blogspot.com

This Whitepaper discusses various incident response methodologies in the context of Advance Persistent Threats.

tags | paper
MD5 | c36b3dcc861b53c231eca34313bf10cf
Exploiting CVE-2014-4113 On Windows 8.1
Posted Nov 2, 2014
Authored by Moritz Jodeit

This whitepaper discusses exploitation of CVE-2014-4113 on Windows 8.1.

tags | paper
systems | windows
advisories | CVE-2014-4113
MD5 | 216c619044ba2c9130f42e164b525d81
Design And Implementation Of A Voice Encryption System For Telephone Networks
Posted Sep 1, 2014
Authored by Fabian Valero Duque

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.

tags | paper, telephony
MD5 | 3f28d8fc39373c087a5feaa44d53835c
Outsmarted - Why Malware Works In Face Of Antivirus Software
Posted Sep 1, 2014
Authored by Daniel Sauder, Matthias Deeg, Sebastian Nerz

This whitepaper provides an analysis of why malware is so successful. For many years, different types of malware rank among the biggest IT security threats both in the business and the private domain. In order to protect one self from the dangers of malware, numerous software manufacturers offer IT security products like antivirus and endpoint protection software. But these products alone offer no sufficient protection from malware that knows some tricks, as the results of the author's recent research with the topic antivirus evasion show.

tags | paper, virus
MD5 | 14fbd9c17d4e94f92f7bdd75b0d1af6e
SQLMap ile CSRF Bypass
Posted Jul 29, 2014
Authored by Ibrahim Balic

This whitepaper discusses hacking with sqlmap and leveraging cross site request forgery vulnerabilities. Written in Turkish.

tags | paper, vulnerability, csrf
MD5 | 68418b19f3a809183774a45c6a6e5099
High Performance Computer Architecture And Security
Posted Jul 1, 2014
Authored by Antoine Vincent Jebara

This whitepaper is an introduction to security in high performance computer architecture.

tags | paper
MD5 | 0cd780472b05e1a3e01d57799ef38c79
Android KeyStore Stack Buffer Overflow
Posted Jun 23, 2014
Authored by Roee Hay, Avi Dayan

This whitepaper discusses a stack-based buffer overflow vulnerability in the Android KeyStore service which affects Android 4.3 and below.

tags | exploit, overflow
advisories | CVE-2014-3100
MD5 | 57b5c46e9cae6f3219be13865cb059ad
Bypassing SSL Pinning On Android Via Reverse Engineering
Posted May 20, 2014
Authored by Denis Andzakovic | Site security-assessment.com

This whitepaper details the steps taken to unpack an application, locate the pinning handler, patch and repack. The techniques detailed in this whitepaper may also be used to achieve other goals when hacking Android applications.

tags | paper
MD5 | fe5043c5929d8eb6f2bfe05df024b2bc
WAF Bypass Methods
Posted Apr 29, 2014
Authored by Deniz Cevik

This whitepaper discusses various web application firewall bypass methodologies. Written in Turkish.

tags | paper, web, bypass
MD5 | 5db5d21ca8c94c8eaa853979e51138b4
Introduction To Android Malware Analysis
Posted Apr 29, 2014
Authored by Ugur Cihan KOC

This whitepaper provides an overview of the tools used in order to analyze malware on Android.

tags | paper
MD5 | 95bb20abfa4a8c8d3164ea326cbcd9f2
Wifi Packet Capturing / Session Hijacking Using Wireshark
Posted Apr 24, 2014
Authored by Er. Deepanshu Kapoor

This whitepaper details how to perform wifi man in the middle attacks and then sniff the traffic for analysis afterwards using Wireshark.

tags | paper
MD5 | db21df58359e06562d2ba8252fc56a9d
WhatsApp Database Extraction
Posted Apr 4, 2014
Authored by Monendra Sahu

This whitepaper is a walk through on how to extract msgstore.db.crypt5 from WhatsApp on Android and using tools to break crypt5.

tags | paper
MD5 | 88740b341d45db8dd6d5f3aaae7c4395
Heap Spraying Whitepaper
Posted Feb 25, 2014
Authored by 6_Bl4ck9_f0x6

This whitepaper discusses heap spraying. Written in Portuguese.

tags | paper
MD5 | fe0c6a5e6c7c733b929a38391abdf0d1
Owning A CA Control Access Server
Posted Feb 20, 2014
Authored by Sanehdeep Singh

This whitepaper documents how to compromise CA ControlMinder versions 12.5, 12.6, and 12.6 SP1 running JBoss version 4.2.2.GA.

tags | paper
MD5 | b2fbb92d2438c9ea11e8997c642a8de3
Rooting Windows Server Using PHP Meterpreter Webshell
Posted Feb 5, 2014
Authored by Hasan Sharukh, Anshul Gupta

This whitepaper discusses rooting windows server using the PHP Meterpreter Webshell in Metasploit.

tags | paper, root, php
systems | windows
MD5 | e5580d457a0bb8ab6f1659e60241cdb3
Alert(1) To Win
Posted Feb 4, 2014
Authored by PEPE Vila, Daniel Diez

This whitepaper discusses the various type of cross site scripting attacks (reflected, stored, DOM, and mutated). It also encompasses 16 solved challenges. Written in Spanish.

tags | paper, xss
MD5 | 071d92472fbef9935eb1271e3086f5df
Ektron CMS Account Hijacking
Posted Jan 30, 2014
Authored by Mark Litchfield | Site securatary.com

This whitepaper discusses how to perform a take over of the Ektron CMS. It demonstrates how to hijack the builtin and admin accounts.

tags | exploit
MD5 | 0856fe75f96c637a28b5646229e477c2
Smashing Bitcoin BrainWallets For Fun And Profit
Posted Jan 30, 2014
Authored by Simo Ben Youssef

This whitepaper discusses how attackers use dictionary-based brute-force attacks to steal other people's bitcoins. Proof of concept tools are included.

tags | paper, proof of concept
MD5 | 253b3dc18147eb55d705a0bf1f116404
Hacking XPath 2.0
Posted Jan 8, 2014
Authored by Sumit Siddharth, Thomas Forbes

This whitepaper details some novel methods of exploiting blind XPath 2.0 injection flaws that can be used to retrieve the whole document being queried (and others on the filesystem) without needing a large number of requests. It also covers exploiting some common XML databases.

tags | paper
MD5 | 0d921a492a387bade60f73947327b34c
Bypassing Modern Web Application Firewalls
Posted Dec 14, 2013
Authored by Rafay Baloch

This whitepaper is called Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters.

tags | paper, web
MD5 | 929bd2711e1c79a08e4a6c59381ac3ec
Page 1 of 4
Back1234Next

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close