exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Different Rewrite Methods Available With mod_rewrite For Blacklisting
Posted Nov 18, 2013
Authored by Chetan Soni

This whitepaper goes into detail and multiple different ways you can using blacklisting with mod_rewrite.

tags | paper
SHA-256 | 445a092f63671e00d8cffe2e287b941a30901deeac5d0dc5b36b340fe8ad032a

Related Files

Chinese Attack On USIS Exploiting SAP Vulnerability
Posted Jul 15, 2015
Authored by ERPScan Research Team | Site erpscan.com

This whitepaper contains research details an attack timeline, documents what vulnerability was exploited, and provide recommendations on how to avoid data breaches in SAP systems.

tags | paper
SHA-256 | dcff6a0ea2091f5fe7bffdc14f8099eaff07f1cd9faee672d80b8d8bfb1b39fb
Privilege Escalation Via Client Management Software Part 2
Posted Jul 14, 2015
Authored by Matthias Deeg

This whitepaper deals with local privilege escalation attacks via exploiting vulnerabilities in the client management software Empirum.

tags | paper, local, vulnerability
SHA-256 | 976d9cf9503cd3beaddb146f9507ee3529d1b82a6712b2cdc7b7ce1b67ac583a
Privilege Escalation Via Client Management Software Part 1
Posted Jul 14, 2015
Authored by Matthias Deeg

This whitepaper deals with local privilege escalation attacks via exploiting vulnerabilities in the client management software FrontRange DSM.

tags | paper, local, vulnerability
SHA-256 | 08ece3edf3aa93e1fde88c8522d035bcfa58b66f09c695d34999e853118ef852
Identifier-Based XSSI Attacks
Posted Apr 15, 2015
Authored by Takeshi Terada

This whitepaper focuses on a method of stealing data as a client side script's identifier (variable or function name). The author describes these attack techniques / browser vulnerabilities and then discuss countermeasures for these issues.

tags | paper, vulnerability
advisories | CVE-2014-6345, CVE-2014-7939
SHA-256 | 8bfa6b14e13a3f906c5514c4e8df9d61d08c0fdbec7c3caccf3b7b25358569b0
Denial Of Service Attacks In Wireless Networks
Posted Jan 25, 2015
Authored by Mallikarjun Hangargi

This whitepaper discusses denial of service attacks carried out in WLANs at the physical and MAC layers. It touches on IEEE 802.11 protocol flaws for handling frames at the MAC layer, preventive measures for DoS attacks, and protocol design suggestions.

tags | paper, denial of service, protocol
SHA-256 | 6d910f077be7eb4de49610dc219dbaa4e68eb656e789d18d33b3965e8a9769f4
APT - Incident Response Methodologies And Effectiveness
Posted Dec 18, 2014
Authored by Lokesh Pidawekar | Site infosecforever.blogspot.com

This Whitepaper discusses various incident response methodologies in the context of Advance Persistent Threats.

tags | paper
SHA-256 | 6d63e768574dbbaffa0f9ac592edcdf824a46f9435bf8c3749fbb80f7a15b666
Exploiting CVE-2014-4113 On Windows 8.1
Posted Nov 2, 2014
Authored by Moritz Jodeit

This whitepaper discusses exploitation of CVE-2014-4113 on Windows 8.1.

tags | paper
systems | windows
advisories | CVE-2014-4113
SHA-256 | 347b65c62cf9b21ce7a51217f70945df6a72439a4ef09808f6143d9103ce6fc4
Design And Implementation Of A Voice Encryption System For Telephone Networks
Posted Sep 1, 2014
Authored by Fabian Valero Duque

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.

tags | paper, telephony
SHA-256 | 96654408957024ded313fec057b5f79be73443423be062807bec0d5dffc0bf05
Outsmarted - Why Malware Works In Face Of Antivirus Software
Posted Sep 1, 2014
Authored by Daniel Sauder, Matthias Deeg, Sebastian Nerz

This whitepaper provides an analysis of why malware is so successful. For many years, different types of malware rank among the biggest IT security threats both in the business and the private domain. In order to protect one self from the dangers of malware, numerous software manufacturers offer IT security products like antivirus and endpoint protection software. But these products alone offer no sufficient protection from malware that knows some tricks, as the results of the author's recent research with the topic antivirus evasion show.

tags | paper, virus
SHA-256 | dec9eff1124fd9cbaf98f478be5bc00a12adec280ae5425357c695fc475ac738
SQLMap ile CSRF Bypass
Posted Jul 29, 2014
Authored by Ibrahim Balic

This whitepaper discusses hacking with sqlmap and leveraging cross site request forgery vulnerabilities. Written in Turkish.

tags | paper, vulnerability, csrf
SHA-256 | 7130a96bfe8e601c63c6db831c76a47578959bc3aa160183ca7c39ba4c380efd
High Performance Computer Architecture And Security
Posted Jul 1, 2014
Authored by Antoine Vincent Jebara

This whitepaper is an introduction to security in high performance computer architecture.

tags | paper
SHA-256 | 4337cb70d614e077a9820aee114c0aa3a101b1836901fcfc7b8811d90e34b6df
Android KeyStore Stack Buffer Overflow
Posted Jun 23, 2014
Authored by Roee Hay, Avi Dayan

This whitepaper discusses a stack-based buffer overflow vulnerability in the Android KeyStore service which affects Android 4.3 and below.

tags | exploit, overflow
advisories | CVE-2014-3100
SHA-256 | f7115facb01ba5509340d2f23ccfd38240c5a8ae2b85f19bd810f467d71ca0f8
Bypassing SSL Pinning On Android Via Reverse Engineering
Posted May 20, 2014
Authored by Denis Andzakovic | Site security-assessment.com

This whitepaper details the steps taken to unpack an application, locate the pinning handler, patch and repack. The techniques detailed in this whitepaper may also be used to achieve other goals when hacking Android applications.

tags | paper
SHA-256 | b380448797b174e0ef5426b8ceaf08d03d726e7add0c4fa1576aecd5d4c6dc55
WAF Bypass Methods
Posted Apr 29, 2014
Authored by Deniz Cevik

This whitepaper discusses various web application firewall bypass methodologies. Written in Turkish.

tags | paper, web, bypass
SHA-256 | d04d9dc9ed267c9142d78a1a35f38d8397df4345faa4d26a2221dd442c5ad695
Introduction To Android Malware Analysis
Posted Apr 29, 2014
Authored by Ugur Cihan KOC

This whitepaper provides an overview of the tools used in order to analyze malware on Android.

tags | paper
SHA-256 | 768a61b28e90178964b682b152e60eca11af1e5d5bb90aff633a7c86d60fa152
Wifi Packet Capturing / Session Hijacking Using Wireshark
Posted Apr 24, 2014
Authored by Er. Deepanshu Kapoor

This whitepaper details how to perform wifi man in the middle attacks and then sniff the traffic for analysis afterwards using Wireshark.

tags | paper
SHA-256 | ba682f01ac66297c006d03d6d6a391811b8546679c41f35d715ecb25f387a262
WhatsApp Database Extraction
Posted Apr 4, 2014
Authored by Monendra Sahu

This whitepaper is a walk through on how to extract msgstore.db.crypt5 from WhatsApp on Android and using tools to break crypt5.

tags | paper
SHA-256 | 68ad521e10670bbb65c0d7b97ed8b497b83fd054c87bf2fe62d0596ebb035636
Heap Spraying Whitepaper
Posted Feb 25, 2014
Authored by 6_Bl4ck9_f0x6

This whitepaper discusses heap spraying. Written in Portuguese.

tags | paper
SHA-256 | 4d45d4dd1363f5031cde304561cd53549c288ebffe7ac68449637f119a2fbfcc
Owning A CA Control Access Server
Posted Feb 20, 2014
Authored by Sanehdeep Singh

This whitepaper documents how to compromise CA ControlMinder versions 12.5, 12.6, and 12.6 SP1 running JBoss version 4.2.2.GA.

tags | paper
SHA-256 | d79c4e8b7e01e49acdda05ad5eceda4f0bf7d0d76f4b960c5d9135475bebc7d6
Rooting Windows Server Using PHP Meterpreter Webshell
Posted Feb 5, 2014
Authored by Hasan Sharukh, Anshul Gupta

This whitepaper discusses rooting windows server using the PHP Meterpreter Webshell in Metasploit.

tags | paper, root, php
systems | windows
SHA-256 | 969178f6ff5208ad667a07134dd268f1f3afb8fbcc598cfc6a4095ef57d2b50b
Alert(1) To Win
Posted Feb 4, 2014
Authored by PEPE Vila, Daniel Diez

This whitepaper discusses the various type of cross site scripting attacks (reflected, stored, DOM, and mutated). It also encompasses 16 solved challenges. Written in Spanish.

tags | paper, xss
SHA-256 | bc543a96e318a73cdeefad02ee4de9c48c143df8ed4dc2608e4017ade8a45e8a
Ektron CMS Account Hijacking
Posted Jan 30, 2014
Authored by Mark Litchfield | Site securatary.com

This whitepaper discusses how to perform a take over of the Ektron CMS. It demonstrates how to hijack the builtin and admin accounts.

tags | exploit
SHA-256 | 4051126d4a1554f5aa1a371e3823fe1746489da90272c4a0bd3f21fffb9a0ce0
Smashing Bitcoin BrainWallets For Fun And Profit
Posted Jan 30, 2014
Authored by Simo Ben Youssef

This whitepaper discusses how attackers use dictionary-based brute-force attacks to steal other people's bitcoins. Proof of concept tools are included.

tags | paper, proof of concept
SHA-256 | d3b473fd72aba55764c5b793c9300a33b4bc94411e4282b14f400213f149aa0d
Hacking XPath 2.0
Posted Jan 8, 2014
Authored by Sumit Siddharth, Thomas Forbes

This whitepaper details some novel methods of exploiting blind XPath 2.0 injection flaws that can be used to retrieve the whole document being queried (and others on the filesystem) without needing a large number of requests. It also covers exploiting some common XML databases.

tags | paper
SHA-256 | bb958f4f5dc663b2b29dda1a486d1e5c6aaa2c1a738838917678623686d2a543
Bypassing Modern Web Application Firewalls
Posted Dec 14, 2013
Authored by Rafay Baloch

This whitepaper is called Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters.

tags | paper, web
SHA-256 | 65acaee3edb30787203ec67ebd4b8e85f2ced5170a1f786efb797a9df09856b3
Page 1 of 4
Back1234Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close