exploit the possibilities
Showing 1 - 25 of 100 RSS Feed


WhatsApp Remote Code Execution
Posted Jul 5, 2020
Authored by Ashu Jaiswal

Whitepaper discussing how to leverage the WhatsApp remote code execution vulnerability that takes advantage of a double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library.

tags | paper, remote, code execution
advisories | CVE-2019-11932
MD5 | 9970cc4e34af7ebf4899a50eaf2a2bc7

Related Files

Triggering Windows 7
Posted Aug 8, 2012
Authored by Prateek Shukla

This is a brief whitepaper discussing how to BackTrack 5 and the Social Engineering Toolkit (SET) to generate a malicious java applet in order to gain a reverse shell on Windows 7.

tags | paper, java, shell
systems | windows, 7
MD5 | 90592cc3d1cec515fb3309b0cc7f81d8
Buffer Overflow Explanation
Posted Jul 1, 2012
Authored by Dr-Freak

This is a whitepaper discussing how to perform very classical text book buffer overflow attacks.

tags | paper, overflow
MD5 | a1095373493092649a55c6b30570e50e
Insecurity Of Poorly Designed Remote File Inclusion Payloads Part 2
Posted Jun 25, 2012
Authored by bwall | Site firebwall.com

This whitepaper discusses the insecurity of poorly designed remote file inclusion payloads. This is part two.

tags | paper, remote, file inclusion
MD5 | db334ed835af32fbdea7852b6b5cba1e
Insecurity Of Poorly Design Remote File Inclusion Payloads Part 1
Posted Jun 11, 2012
Authored by bwall | Site firebwall.com

This whitepaper discusses the insecurity of poorly designed remote file inclusion payloads. This is part one.

tags | paper, remote, file inclusion
MD5 | 47573a79c58e0172417ac4842b970cb0
Remote Command Execution Through Local File Inclusion
Posted Jun 10, 2012
Authored by JosS

This is a brief whitepaper discussing remote command execution through local file inclusion. Written in Spanish.

tags | paper, remote, local, file inclusion
MD5 | ac4ebb0fd26ee721031941cc5a21dc09
Failure To Restrict Access
Posted May 23, 2012
Authored by Fernando Andina, Jose Miguel Soriano

This is a brief whitepaper discussing methods of validating a lack of access restriction for various pages on sites. It discusses everything from visual viewing and comparison between cookies used and using an implementation of the Damerau-Levensthein model. They also have a tool for download.

tags | paper
MD5 | 69ab06734848cee07954db4cbbbc802d
How Secure Is Contactless Smartcard Technology
Posted Mar 30, 2012
Authored by Hitesh Malviya

This is a brief whitepaper discussing the security of contactless smartcard technology.

tags | paper
MD5 | bec6389370e339eaae8653020480ad03
Covert Channel Over ICMP
Posted Mar 9, 2012
Authored by Debasish Mandal

This whitepaper discusses using ICMP as a covert tunnel for traffic. An example of this technique is tunneling complete TCP traffic over ping requests and replies. More technically it works by injecting arbitrary data into an echo packet sent to a remote computer. The remote computer replies in the same manner, injecting an answer into another ICMP packet and sending it back.

tags | paper, remote, arbitrary, tcp
MD5 | 3cfae27b26d2142572800ad372e252ed
Mobile Based MITM Attack
Posted Feb 5, 2012
Authored by Bilal Bokhari

This is a brief whitepaper discussing how to set up QT Mobile Hotspot and YAMAS applications to man in the middle connections using your phone.

tags | paper
MD5 | 6756a8aa5d75c60ab30be7b7312b4fc3
iPhone Forensics On iOS 5
Posted Jan 20, 2012
Authored by Satish Bommisetty

This is a brief whitepaper discussing how to perform forensics on iOS 5 on the iPhone.

tags | paper
systems | apple, iphone
MD5 | 782903866dd7d55143c6835188eda2fe
Exploit WebDAV... The Garage Way
Posted Dec 26, 2011
Authored by Dhiraj Datar

This is a brief whitepaper discussing how to exploit a webDAV enabled server.

tags | paper
MD5 | 9f254c048e06b9bde5c3fa60cc95b55b
Using Google As A Malware Spreading Technique
Posted Dec 7, 2011
Authored by PCA

This is a short whitepaper discussing how to use Google as a malware spreading tool.

tags | paper
MD5 | 31914f05ed37d40f246f2a15796ef84f
Anatomy Of A Pass Back Attack
Posted Nov 1, 2011
Authored by Deral Heiland, Michael Belton | Site foofus.net

Brief whitepaper discussing how to trick a printer into passing LDAP or SMB credentials back to an attacker in plain text.

tags | paper
MD5 | 8a5033d9c7adfc19759c96133ff7f0ea
Top Seven ColdFusion Security Issues
Posted Sep 14, 2011
Authored by Sysmox

This whitepaper discusses the most prevalent security issues with server configurations and application implementations for ColdFusion.

tags | paper
MD5 | 6a314661afd99deedfd1dd237aabc836
Brief Whitepaper On Underground Hacking
Posted May 27, 2011
Authored by ninjashell

This is a brief whitepaper discussing tools and methodologies used by black hat hackers.

tags | paper
MD5 | b0ae8a4a3035fe7755147e86b76c1943
Implementing Security Improvements In JBoss
Posted May 18, 2011
Authored by Alexandro Silva | Site alexos.org

Brief whitepaper discussing security improvements that should be implemented in JBoss application server installations.

tags | paper, java
MD5 | 053f8b4ab8c8403e9f002c416ee7f938
Anatomy Of A NULL Session Attack
Posted May 6, 2011
Authored by Pouya Daneshmand

Whitepaper discussing the anatomy of a null session attack, how it works, and how to prevent it from happening to you. Written in Persian.

tags | paper
MD5 | e11501a46ae00650982b057c2e97eb3e
Path Traversal - Bypass Methods
Posted May 6, 2011
Authored by Pouya Daneshmand

Short whitepaper discussing path traversal and bypass methods of exploitation.

tags | paper, file inclusion
MD5 | cdf93307b1346efd4887071551b67c80
How To Make A Backdoor With Return Oriented Programming
Posted Apr 13, 2011
Authored by Jonathan Salwan

Whitepaper discussing how to make a backdoor with return oriented programming and ROPgadget. Written in French.

tags | paper
MD5 | 7803972b6be7ee7c1ac1dfe364da24ea
Guidebook On Cross Site Scripting
Posted Mar 27, 2011
Authored by Ankit Anand

Whitepaper discussing cross site scripting, bypassing techniques, and the usefulness of these attacks.

tags | paper, web, xss
MD5 | 4a551ec6dc2e708d3cc8bdc937e9802a
Privacy Of Data On Social Networks
Posted Mar 26, 2011
Authored by R. Harikrishnan

This is a whitepaper discussing the risk associated with the privacy of your data on Facebook.

tags | paper, web
MD5 | 77644050c700d33c017cc6fb00171acd
Problems Faced By Cloud Computing
Posted Feb 25, 2011
Authored by L0rd CrusAd3r

Brief whitepaper discussing some problems faced when using cloud computing.

tags | paper
MD5 | f56240cf1e3214f9b13f1f70c749b4f4
Debian 5.0.6 / Ubuntu 10.04 Webshell To Remote Root
Posted Oct 28, 2010
Authored by jmit

Whitepaper discussing how to go from having a webshell to getting remote root using the GNU dynamic linker DSO vulnerability on Debian versions 5.0.6 and below and Ubuntu versions 10.04 and below.

tags | exploit, remote, root
systems | linux, debian, ubuntu
advisories | CVE-2010-3856
MD5 | b5d2edb70a3955504df2b49334ec19bf
Blackboxes - Owning Broadband Routers
Posted Jan 20, 2010
Authored by ShadowHatesYou

This is a brief whitepaper discussing how to own Blackboxes (typical broadband routers such as SB5120s, SMC Connect, D-Link dcm-202s, Toshiba PCX2600s, and a handful of RCA and Linksys modems).

tags | exploit
MD5 | 24a0d7f9eb060591cb7b32f48b8ea9fe
Portuguese Whitepaper About SQL Injection
Posted Jan 19, 2010
Authored by Rafael Arantes

Whitepaper discussing SQL injection. Written in Portuguese.

tags | paper, sql injection
MD5 | be352ed7cb456f96db7991ac76f81452
Page 1 of 4

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    7 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By