what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed


8 In 1 Tips For WordPress Security
Posted Jul 1, 2014
Authored by Chetan Soni

Whitepaper called 8 in 1 Tips for WordPress Security - Their Issues and Their Solutions.

tags | paper
MD5 | fdb74f483b2997eb28df4d808e6e1864

Related Files

Bypassing Spam Filters Using Homographs
Posted Jul 30, 2012
Authored by Fady Mohamed Osman

This is a whitepaper called Bypassing Spam Filter Using Homographs. Some generation code is also included.

tags | paper
systems | linux
MD5 | 9395f5bee432162375e37981ac30a2ac
Reverse Engineering Malware Part 1
Posted May 2, 2012
Authored by Arunpreet Singh

Whitepaper called Reverse Engineering Malware Part 1.

tags | paper
MD5 | 5a024a46d9813b832462a13a9362ba84
Actuality Of SMBRelay In Modern Windows Networks
Posted Apr 28, 2012
Authored by Ares

Whitepaper called Actuality of SMBRelay in Modern Windows Networks.

tags | paper
systems | windows
MD5 | 81653f8d5eb1f2a90fee0f43369d9388
Intro To SQL Injection And Countermeasures
Posted Apr 24, 2012
Authored by Hitesh Malviya

Whitepaper called Intro to SQL Injection and Countermeasures.

tags | paper, sql injection
MD5 | 68db188cf8aab372f9306915334ea57d
Exploring Windows Backdoors
Posted Apr 20, 2012
Authored by Lulzsec47

This is a whitepaper called Exploring Windows Backdoors - Bypassing Firewalls on Webhosting Providers.

tags | paper
systems | windows
MD5 | dc6f6cef040a7a562bff70b2ea29f9e8
The Source Is A Lie
Posted Apr 17, 2012
Authored by Andreas Nusser | Site sec-consult.com

Whitepaper called The Source Is A Lie. Backdoors have always been a concern of the security community. In recent years the idea of not trusting the developer has gained momentum and manifested itself in various forms of source code review. For Java, being one of the most popular programming languages, numerous tools and papers have been written to help during reviews. While these tools and techniques are getting developed further, they usually focus on traditional programming paradigms. Modern concepts like Aspect Oriented Programming or the Java Reflection API are left out. Especially the use of Java’s Reflection API in conjunction with the lesser known “string pool” can lead to a new kind of backdoor. This backdoor hides itself from unwary reviewer by disguising its access to critical resources like credential through indirection. To raise the awareness about this particular kind of backdoor, this paper will provide a short introduction to the string pool, show how reflection can be used to manipulate it, demonstrate how a backdoor can abuse this, and discuss how it can be uncovered.

tags | paper, java
MD5 | 95c7b6fb02b2acae134655f38d6826c1
JavaScript Deobfuscation
Posted Apr 16, 2012
Authored by Sudeep Singh

Whitepaper called JavaScript Deobfuscation - A Manual Approach.

tags | paper, javascript
MD5 | 394491af70ed0366a12d7c638a9593c7
Blind Date With Your Girlfriend
Posted Apr 10, 2012
Authored by Nipun Jaswal

This is a whitepaper called Blind Date With Your Girlfriend. It is a brief tutorial that explains how to use Metasploit to hack a Windows box.

tags | paper
systems | windows
MD5 | 581638862cff171206c8c5b82a36fcbc
Anatomy Of A Credit Card
Posted Apr 4, 2012
Authored by Hitesh Malviya

Whitepaper called Anatomy of a Credit Card.

tags | paper
MD5 | 98e1268d250239c216012621ce8bcccf
DNS Spoofing
Posted Apr 4, 2012
Authored by Marcelo Moraes

Whitepaper called DNS Spoofing. Written in Portuguese.

tags | paper, spoof
MD5 | 7bdb983b4ae751b09c49de1290cdf2d9
Basic Pentesting Steps
Posted Mar 29, 2012
Authored by n4sss

Whitepaper called Basic Pentesting Steps. Written in Portuguese.

tags | paper
MD5 | ebda5c1727e0395bee2e656071182ff1
Exploring And Patching Remote File Disclosure
Posted Mar 22, 2012
Authored by NassRawI

Whitepaper called Exploring and Patching Remote File Disclosure Vulnerabilities. Written in Arabic.

tags | paper, remote, vulnerability
MD5 | 1b9d9377a70cc4d607783cf605d15628
Using UPX As A Security Packer
Posted Mar 22, 2012
Authored by Dr Petri

Whitepaper called Using UPX as a Security Packer. It goes into detail on how to use this tool and how to bring obfuscation into it.

tags | paper
MD5 | 847424d82e15f2a25de42bf5aaa0f66e
Pentest: Information Gathering
Posted Mar 19, 2012
Authored by Jose Miguel Holguin, Broja Merino Febrero

This is a whitepaper called Pentest: Information Gathering. Written in Spanish.

tags | paper
MD5 | 2ca850ead2557a7defe47affd47c6ce8
Attacking The Washington, D.C. Internet Voting System
Posted Mar 3, 2012
Authored by Scott Wolchok, Eric Wustrow, J. Alex Halderman, Dawn Isabel

Whitepaper called Attacking the Washington, D.C. Internet Voting System. In 2010, Washington, D.C. developed an Internet voting pilot project that was intended to allow overseas absentee voters to cast their ballots using a website. The authors of this paper participated in a challenge to break the security of the system and in doing so, elected Bender from Futurama to the school board.

tags | paper
MD5 | bf259421383085dfe1dea44f3ea2912a
Metasploit Low Level View
Posted Feb 28, 2012
Authored by Saad Talaat

Whitepaper called Metasploit: Low Level View. It touches on topics such as code injection and malware detection evasion / Metasploit encoders.

tags | paper
MD5 | 0559a81662deefef0464d9ae73e2544c
Return-Oriented Programming Na Unha!
Posted Feb 23, 2012
Authored by m0nad

Whitepaper called Return-Oriented Programming Na Unha! Written in Portuguese.

tags | paper
MD5 | a419a2a94db7471d78bcf483922d6890
Wi-Fi Security With Wi-Fi Protection Plus
Posted Feb 12, 2012
Authored by Ajin Abraham, Vimal Jyothi

Whitepaper called Wi-Fi Security with Wi-Fi Protection Plus. Wi-Fi P+ is a new security architecture proposed by the authors.

tags | paper
MD5 | 16043c7211664d2a65cd89b3424c7fdc
Shell Code Injection To Process
Posted Feb 9, 2012
Authored by Turkeshan

Whitepaper called Shell Code Injection To Process. Written in Turkish.

tags | paper, shell
MD5 | 9caf5ab14b0324dd2531325a849b788e
DNS Service Oriented DoS / DDoS Attacks
Posted Feb 5, 2012
Authored by Huzeyfe ONAL

Whitepaper called DNS Service Oriented Denial of Service / Distributed Denial of Service Attacks. Written in Turkish.

tags | paper, denial of service
MD5 | 65e8a925c1f765f5b5d447b24ea5fde3
A Backdoor In The Next Generation Active Directory
Posted Jan 24, 2012
Authored by Dmitriy Evteev

This is a brief whitepaper called A Backdoor in the Next Generation Active Directory.

tags | paper
MD5 | 4322964f07c8caf1a4bd6cd89912fef5
SafeSEH+SEHOP All-At-Once Bypass Exploitation Method Principles
Posted Jan 11, 2012

Whitepaper called SafeSEH+SEHOP all-at-once bypass exploitation method principles.

tags | paper
MD5 | 83ce42a2ebc0a0cb5a110a97fb019c23
Buffer Overflows: Anatomy Of An Exploit
Posted Jan 11, 2012
Authored by Joshua Hulse

Whitepaper called Buffer Overflows: Anatomy of an Exploit. A look at how systems are exploited and why these exploits exist.

tags | paper, overflow
MD5 | 5ed1c91a3ec36484f952cddff2c5778a
Linux Kernel Hooking / Data Manipulations / Root Exploits
Posted Jan 3, 2012
Authored by Turkeshan

Whitepaper called Linux Kernel Hooking, Data Manipulations and Making Root Exploits. Written in Turkish.

tags | paper, kernel, root
systems | linux
MD5 | 28fae139bde9a4dc5de620503482207d
DoS Attacks And Mitigation Techniques
Posted Dec 28, 2011
Authored by Subramani Rao

Whitepaper called Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis. Unlike other theoretical studies, this paper lays down the steps involved in implementing these attacks in real time networks. These real time attacks are measured and analyzed using network traffic monitors. In addition to that, this project also details various defense strategies that could be enabled on Cisco routers in order to mitigate these attacks. The detection and mitigation mechanisms designed here are effective for small network topologies and can also be extended to analogous large domains.

tags | paper, denial of service
systems | cisco
MD5 | a7d283e69e99422e2fe86041f1af3f16
Page 1 of 4

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By